Sample Tech Sem Report
Sample Tech Sem Report
Submitted to
The Department of Computer Science and Engineering
Bachelor of Technology
In
K.SRIYA
19R11A0519
CERTIFICATE
1 4-6
TECHNICAL REPORT
3 BASE PAPER 28
TECHNICAL REPORT
PREDICTIVE ANALYTICS AS A SECURITY MANAGEMENT TOOL
AND ITS APPLICATION IN CYBER SECURITY
1. INTRODUCTION TO PREDICTIVE ANALYTICS:
The term Predictive analytics is defined as the art and discipline of utilizing data which helps
in discovering relationships and hidden patterns within the data.It doesn't tell what exactly
happens in the future, but forecasts what will happen and provides valued actionable visions
for assured decision-making[3].This technology has grown a lot in these days from
developing a predictive model that has the capability to impact a decision which plays a
major role in cooperating these models into daily operations.[5] The software applications of
predictive analytics use variables that can be measured and analyzed. These variables are
used to forecast the expected performance of machinery, persons or other entities.
Big data, Predictive analytics has also gained a lot of importance and prominence. The usage
of wide number data application tools like Hadoop and other big data platforms have created
a large number of data mining opportunities to increase predictive insights. Amplified
development and profit orientation of machine learning tools by IT merchants has also aided
enlarged predictive analytics proficiencies [9].
3. PROPOSEDFRAMEWORK PROCESS:
The below fig explains how the proposed framework works and the important stages in it.
3. 3.Data Preparation:
The collected data from the data Collection stage is prepared and transformed into the related
format and this collected data is used for analysis. This data may contain missing values and
these missing values are identified by using Algorithms of classification and regression. At
this phase, variables and observations will either be removed or added to the data set. The
variables and observations help in determining whether the missing values are needed to be
add to predict the observations or for model training.[1][10]
4. 4. Malware:
Malware is one among the well-known security extortions, It refers to several types of
innocuous software executed when a user erroneously downloads it[6]. Malware is involved
in many recent cyber security breaches which also, includes the ransomware attacks
Petya/Not Petya and Winery. Old-fashioned malware such as back doors and Trojans viruses
also remain determined.
6. CONCLUSION:
The present evolving technologies with new characteristics had also carried about fresh
security extortions and dangers. It is essential for security specialists to continue in
discovering solutions to this major challenge i.e, never-ending security extortions and
hazards[10][11].Predictive analytics is the technique used by many of the researchers, but
many may not work with this till the end, few of them end up by providing explanatory
solutions which use data mining techniques to investigate security extortions and hazards.The
quickness of identifying the potential threats and finding the solutions to the threats before
they occur is very important[10].
REFERENCES
[1] Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, "HomeAlone: CoresidencyDetection in the Cloud via Side-
Channel Analysis," pp. 313-328, 2011.
[2] C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, "NICE: Networkintrusion detection and
countermeasure selection in virtual networksystems," Dependable and Secure Computing, IEEE Transactions
on, vol.10, pp. 198-211, 2013.
[3] Y. Low, D. Bickson, J. Gonzalez, C. Guestrin, A. Kyrola, and J. M.Hellerstein, "Distributed GraphLab: a
framework for machine learningand data mining in the cloud," Proceedings of the VLDB Endowment, vol.5, pp.
716-727, 2012.
[4] G. Shmueli and O. Koppius, "Predictive analytics in information systemsresearch," Robert H. Smith School
Research Paper No. RHS, pp. 06-138,2010.
[5] G. Shmueli, "To explain or to predict?," Statistical science, pp. 289-310,2010.
[6] Y. Tan, H. Nguyen, Z. Shen, X. Gu, C. Venkatramani, and D. Rajan,"Prepare: Predictive performance
anomaly prevention for virtualizedcloud systems," in Distributed Computing Systems (ICDCS), 2012 IEEE
32nd International Conference on, 2012, pp. 285-294.
[7] A. Sanfilippo, "Fostering the Creation of Decision Advantage throughModel Integration and Evaluation,"
presented at the Workshop on CurrentIssues in Predictive Approaches to Intelligence and Security
Analytics,Vancouver, BC, Canada, 2010.
[8] C. Elkan, "Predictive analytics and data mining," Retrieved from cseweb.ucsd. edu, 2013.
[9] G. Shmueli, "To Explain or to Predict?," vol. Vol. 25, ed, 2010.
[10] Y. N. Tan, Hiep Shen, Zhiming Gu, Xiaohui Venkatramani, Chitra Rajan,Deepak, "PREPARE: Predictive
Performance Anomaly Prevention forVirtualized Cloud Systems," p. 10, 2012.
[11] P. S. Rahul Singh, Maitreya Natu, Vaishali Sadaphal, Harrick Vin,"Analytical Modeling for What-if
Analysis in Complex Cloud ComputingApplications," Performance Evaluation Review, vol. 40, p. 10, 2013.106
SLIDES
[BASEPAPER]