Regression Based Network Security Scenario Prediction Model
Analysing issues in which one or more independent variables predict an outcome may be done using logistic regression. A binary or dichotomous dependent variable is used to quantify the result, which only comprises data coded as 1 (True, Success, etc.) or 0 (False, Failure, etc). Logistic regression...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2024-01-01
|
Series: | BIO Web of Conferences |
Online Access: | https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00108.pdf |
_version_ | 1797213275618803712 |
---|---|
author | Mutar Awad Ahmed Hamad Efan Yousif Neamah Ibrahim Qays |
author_facet | Mutar Awad Ahmed Hamad Efan Yousif Neamah Ibrahim Qays |
author_sort | Mutar Awad Ahmed |
collection | DOAJ |
description | Analysing issues in which one or more independent variables predict an outcome may be done using logistic regression. A binary or dichotomous dependent variable is used to quantify the result, which only comprises data coded as 1 (True, Success, etc.) or 0 (False, Failure, etc). Logistic regression is used to identify the best model to represent the connection between a dependent variable (outcome or response variable) and a collection of independent (predictor or explanatory) variables. Biomedical applications of LR (Linear Regression) include cancer detection, survival prediction, and more. This is a popular and well-established data analysis approach in statistics and biomedicine. It is also recommended to compare data mining approaches with logistic regression when mining clinical data. In this research, various ideas about network security assessment are described and compared,, and a technique for evaluating the current state of network security using a virtual Honeynet is proposed. A binary linear regression model is developed based on the correlations between Honeynet active, host active of computer networks, and IP active when network intrusion occurs. Prototype systems for data gathering and regression fitting are built, proving the validity of regression prediction models. |
first_indexed | 2024-04-24T10:55:42Z |
format | Article |
id | doaj.art-bea15b1945574699af572434cddf5856 |
institution | Directory Open Access Journal |
issn | 2117-4458 |
language | English |
last_indexed | 2024-04-24T10:55:42Z |
publishDate | 2024-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | BIO Web of Conferences |
spelling | doaj.art-bea15b1945574699af572434cddf58562024-04-12T07:36:22ZengEDP SciencesBIO Web of Conferences2117-44582024-01-01970010810.1051/bioconf/20249700108bioconf_iscku2024_00108Regression Based Network Security Scenario Prediction ModelMutar Awad Ahmed0Hamad Efan Yousif1Neamah Ibrahim Qays2General directorate of educationGeneral directorate of educationGeneral directorate of educationAnalysing issues in which one or more independent variables predict an outcome may be done using logistic regression. A binary or dichotomous dependent variable is used to quantify the result, which only comprises data coded as 1 (True, Success, etc.) or 0 (False, Failure, etc). Logistic regression is used to identify the best model to represent the connection between a dependent variable (outcome or response variable) and a collection of independent (predictor or explanatory) variables. Biomedical applications of LR (Linear Regression) include cancer detection, survival prediction, and more. This is a popular and well-established data analysis approach in statistics and biomedicine. It is also recommended to compare data mining approaches with logistic regression when mining clinical data. In this research, various ideas about network security assessment are described and compared,, and a technique for evaluating the current state of network security using a virtual Honeynet is proposed. A binary linear regression model is developed based on the correlations between Honeynet active, host active of computer networks, and IP active when network intrusion occurs. Prototype systems for data gathering and regression fitting are built, proving the validity of regression prediction models.https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00108.pdf |
spellingShingle | Mutar Awad Ahmed Hamad Efan Yousif Neamah Ibrahim Qays Regression Based Network Security Scenario Prediction Model BIO Web of Conferences |
title | Regression Based Network Security Scenario Prediction Model |
title_full | Regression Based Network Security Scenario Prediction Model |
title_fullStr | Regression Based Network Security Scenario Prediction Model |
title_full_unstemmed | Regression Based Network Security Scenario Prediction Model |
title_short | Regression Based Network Security Scenario Prediction Model |
title_sort | regression based network security scenario prediction model |
url | https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00108.pdf |
work_keys_str_mv | AT mutarawadahmed regressionbasednetworksecurityscenariopredictionmodel AT hamadefanyousif regressionbasednetworksecurityscenariopredictionmodel AT neamahibrahimqays regressionbasednetworksecurityscenariopredictionmodel |