Role of Confusion Matrix for Preventing Cyber Attacks

Cyber attack definition

8 types of cyber attack

  1. Malware
  2. Phishing
  3. Ransomware
  4. Denial of service
  5. Man in the middle
  6. Cryptojacking
  7. SQL injection
  8. Zero-day exploits

PREVENTION OF CYBER ATTACK

Proposed data analytic framework for building IDS
  • Detection rate (DR): Also called True Positive Rate is defined as the ratio of number of network traffic data packet detected correctly by the IDS to the total number of network traffic data packets in the testing dataset.
  • False positive rate: also termed as false alarm rate (FAR), it is the ratio of the number of normal packets detected as malicious packets (FP) to the total normal packets in the testing dataset. If this metric value increases consistently, it may cause the network administrator to deliberately ignore the system warnings Consequently, this may put the entire network into a dangerous stage. Therein, this metric value should be kept as low as possible.
  • Accuracy (ACC): can be defined as the proportion of the total number of the correct classification (detection) of malicious (TN) and normal packet (TP) to the actual size of testing dataset.

SIMPLE WAY OF UNDERSTANDING CONFUSION MATRIX

  1. True Positive (TP): These are the events which were correctly predicted by the model as “occurred = Yes”
  2. True Negative (TN): These are the events which were correctly predicted by the model as “not occurred = No”
  3. False Positive (FP): These are the events which were predicted as “occurred = Yes” but in reality it was “not occurred = No”
  4. False Negative (FN): This is the opposite of FP, i.e. predicted as “not occured = No” but in reality it was “occurred = Yes”

HAPPY LEARNING……

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store