A Cybersecurity Procedure to Vulnerabilities Classification of Windows OS Based on Feature Selection and Machine Learning
dc.contributor.author | Al-Sarray, Noor Alhuda Abdul Hasan | |
dc.contributor.author | Demir, Sait | |
dc.date.accessioned | 2024-09-29T15:50:53Z | |
dc.date.available | 2024-09-29T15:50:53Z | |
dc.date.issued | 2024 | |
dc.department | Karabük Üniversitesi | en_US |
dc.description | 2nd International Conference on Forthcoming Networks and Sustainability in the AIoT Era (FoNeS-AIoT) -- JAN 27-29, 2024 -- Istanbul, TURKEY | en_US |
dc.description.abstract | The fast advancement of systems and technology has led to problems in several areas, with data protection and information security being particularly significant concerns. Cybersecurity is a recently developed field that comprises many strategies aimed at safeguarding sensitive data. By utilizing machine learning techniques, this study has improved the security of the Windows operating system. The categorization of Windows system vulnerabilities was performed using machine learning techniques such as Random Forest, Logistic Regression, Naive Bayes, K-Nearest Neighbors, and Support Vector Machine. The dataset was compiled using materials from the National Institute of Standards and Technology (NIST) and exploit-deb, Care was taken to ensure that the data is real and exists. The parameters that were assessed include accuracy, precision, recall, f1-score, and ROC AUC Score. The Random Forest approach yielded the most precise findings, with an accuracy rate of 97%. The findings indicated that the Random Forest methodology was successful in identifying vulnerabilities in security. | en_US |
dc.identifier.doi | 10.1007/978-3-031-62871-9_18 | |
dc.identifier.endpage | 243 | en_US |
dc.identifier.isbn | 978-3-031-62870-2 | |
dc.identifier.isbn | 978-3-031-62871-9 | |
dc.identifier.issn | 2367-3370 | |
dc.identifier.issn | 2367-3389 | |
dc.identifier.scopus | 2-s2.0-85197765876 | en_US |
dc.identifier.scopusquality | Q4 | en_US |
dc.identifier.startpage | 229 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-3-031-62871-9_18 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14619/3779 | |
dc.identifier.volume | 1035 | en_US |
dc.identifier.wos | WOS:001286524700018 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer International Publishing Ag | en_US |
dc.relation.ispartof | Forthcoming Networks and Sustainability in the Aiot Era, Vol 1, Fones-Aiot 2024 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | Feature Selection | en_US |
dc.subject | Random Forest | en_US |
dc.subject | Logistic Regression | en_US |
dc.subject | Naive Bayes | en_US |
dc.subject | K-Nearest Neighbors | en_US |
dc.subject | SVM | en_US |
dc.title | A Cybersecurity Procedure to Vulnerabilities Classification of Windows OS Based on Feature Selection and Machine Learning | en_US |
dc.type | Conference Object | en_US |