WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Securing the Backbone: Analyzing Cyber-Attacks on Infrastructure Using the UNSW-NB15 Benchmark

ADEROJU ABIOLA MAYOKUN ABIOLA MAYOKUN

Download Paper

Paper Contents

Abstract

A weak point in the system's security chain could put the entire system in danger and provide attackers with possibilities. Some destructive effects of cyber-attacks could be a compromise on the privacy of people's data, which could render an organization or country's physical systems unworkable, destroy those systems, or provide control of those systems to an outside party. The detrimental impacts of cyber-attacks were also addressed and discussed in detail. This study examines cyber-attacks against infrastructure by utilizing the UNSW-NB15 benchmark network intrusion dataset. A thorough analysis has revealed prevalent instances of common attack types such as Normal, Generic, Exploits, Reconnaissance, Back-doors, Worms, and Shell codes each accompanied by their corresponding event frequencies. Additionally, sub-categories within the top three categories were meticulously examined to ascertain the most widespread attacks. The research findings underscore the prevalent preference among cyber attackers for employing traditional methods, where "normal attacks" comprise over 80% of all documented incidents. Generic attacks and exploit attacks are positioned as 8.6% and 1.7%, respectively. In the domain of Generic attacks, the scrutiny of subcategories highlights Session Initial Protocols (SIP) as notably vulnerable to attacks, eclipsing all others with a ranking of 37%. Meanwhile, within the category of Exploit attacks, subcategory analysis underscores browsers as more prone to attacks than any other subcategories. Moreover, the analysis reveals that office documents are also vulnerable targets for cyber-attacks.

Copyright

Copyright © 2024 ADEROJU ABIOLA MAYOKUN. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS40400019362
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us