Regression Based Network Security Scenario Prediction Model

Analysing issues in which one or more independent variables predict an outcome may be done using logistic regression. A binary or dichotomous dependent variable is used to quantify the result, which only comprises data coded as 1 (True, Success, etc.) or 0 (False, Failure, etc). Logistic regression...

Full description

Bibliographic Details
Main Authors: Mutar Awad Ahmed, Hamad Efan Yousif, Neamah Ibrahim Qays
Format: Article
Language:English
Published: EDP Sciences 2024-01-01
Series:BIO Web of Conferences
Online Access:https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00108.pdf
_version_ 1797213275618803712
author Mutar Awad Ahmed
Hamad Efan Yousif
Neamah Ibrahim Qays
author_facet Mutar Awad Ahmed
Hamad Efan Yousif
Neamah Ibrahim Qays
author_sort Mutar Awad Ahmed
collection DOAJ
description Analysing issues in which one or more independent variables predict an outcome may be done using logistic regression. A binary or dichotomous dependent variable is used to quantify the result, which only comprises data coded as 1 (True, Success, etc.) or 0 (False, Failure, etc). Logistic regression is used to identify the best model to represent the connection between a dependent variable (outcome or response variable) and a collection of independent (predictor or explanatory) variables. Biomedical applications of LR (Linear Regression) include cancer detection, survival prediction, and more. This is a popular and well-established data analysis approach in statistics and biomedicine. It is also recommended to compare data mining approaches with logistic regression when mining clinical data. In this research, various ideas about network security assessment are described and compared,, and a technique for evaluating the current state of network security using a virtual Honeynet is proposed. A binary linear regression model is developed based on the correlations between Honeynet active, host active of computer networks, and IP active when network intrusion occurs. Prototype systems for data gathering and regression fitting are built, proving the validity of regression prediction models.
first_indexed 2024-04-24T10:55:42Z
format Article
id doaj.art-bea15b1945574699af572434cddf5856
institution Directory Open Access Journal
issn 2117-4458
language English
last_indexed 2024-04-24T10:55:42Z
publishDate 2024-01-01
publisher EDP Sciences
record_format Article
series BIO Web of Conferences
spelling doaj.art-bea15b1945574699af572434cddf58562024-04-12T07:36:22ZengEDP SciencesBIO Web of Conferences2117-44582024-01-01970010810.1051/bioconf/20249700108bioconf_iscku2024_00108Regression Based Network Security Scenario Prediction ModelMutar Awad Ahmed0Hamad Efan Yousif1Neamah Ibrahim Qays2General directorate of educationGeneral directorate of educationGeneral directorate of educationAnalysing issues in which one or more independent variables predict an outcome may be done using logistic regression. A binary or dichotomous dependent variable is used to quantify the result, which only comprises data coded as 1 (True, Success, etc.) or 0 (False, Failure, etc). Logistic regression is used to identify the best model to represent the connection between a dependent variable (outcome or response variable) and a collection of independent (predictor or explanatory) variables. Biomedical applications of LR (Linear Regression) include cancer detection, survival prediction, and more. This is a popular and well-established data analysis approach in statistics and biomedicine. It is also recommended to compare data mining approaches with logistic regression when mining clinical data. In this research, various ideas about network security assessment are described and compared,, and a technique for evaluating the current state of network security using a virtual Honeynet is proposed. A binary linear regression model is developed based on the correlations between Honeynet active, host active of computer networks, and IP active when network intrusion occurs. Prototype systems for data gathering and regression fitting are built, proving the validity of regression prediction models.https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00108.pdf
spellingShingle Mutar Awad Ahmed
Hamad Efan Yousif
Neamah Ibrahim Qays
Regression Based Network Security Scenario Prediction Model
BIO Web of Conferences
title Regression Based Network Security Scenario Prediction Model
title_full Regression Based Network Security Scenario Prediction Model
title_fullStr Regression Based Network Security Scenario Prediction Model
title_full_unstemmed Regression Based Network Security Scenario Prediction Model
title_short Regression Based Network Security Scenario Prediction Model
title_sort regression based network security scenario prediction model
url https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00108.pdf
work_keys_str_mv AT mutarawadahmed regressionbasednetworksecurityscenariopredictionmodel
AT hamadefanyousif regressionbasednetworksecurityscenariopredictionmodel
AT neamahibrahimqays regressionbasednetworksecurityscenariopredictionmodel