Cyber crime cases and Confusion matrix

What is Confusion Matrix ?

A confusion matrix is a table that is often used to describe the performance of a classification model (or “classifier”) on a set of test data for which the true values are known. The confusion matrix itself is relatively simple to understand, but the related terminology can be confusing.

It is generally used in the places where generally the result is in true or false.

Confusion matrix consist of four parts , true positive , false positive , false negative , true negative.

or consider this diagram :

Confusion matrix for the result of a Binary Classifier

The things to be noted from the diagram is that :

  • There are two possible predicted classes: “yes” and “no”. If we were predicting the presence of a disease, for example, “yes” would mean they have the disease, and “no” would mean they don’t have the disease.

The definition of the 4 confusion matrix terms :

  • true positives (TP): These are cases in which we predicted yes (they have the disease), and they do have the disease.

and what about cyber crime and cyber attacks ?

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

A cyber attack is an attack on the servers or computer in the public or private internet where the attacker seeks to expose, damage, alter, disable or try stealing the current data or changing the system configuration, and that is done unauthorized.

The act of doing Cyber attack is Cyber Crime.

Here are some of the common types of cyber attacks :

  • Malware. Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms.

The above mentioned attacks from corporate point of view are very dangerous and may cost loads of losses when a company incur any of the exploits or attacks .

The techniques used to prevent cyber attacks are :

  • using key and certificates in ssh login to avoid spof.

and Et cetera , Et cetera.

There are many more methods to which are not covered here.

Using Machine Learning

As i said , automating the process , of attack monitoring , can hugely decrease the cost of monitoring , which obviously means you don’t have to pay people to do the same task, but a cyber attack can be lethal and deadly and could cost loss in millions and hence you cannot lease a single point of failure and so a human monitoring is always necessary in this case .

Continuing forward …. machines do mistakes , and so do humans, and there could be one in a million chance that both do at the same time , so we deploy both for the same task so that one’s mistake could be covered by the other , and humans are more trusted as they have years of experience of detecting cyber crime .

And so now comes the task of confusion matrix, we have seen in general the security systems give the status of the security in a boolean (true or false ) and so there efficiency is showing in a form of a table called a confusion matrix and hence , we devise two types of errors from them , False Positive and False Negative .

False Negative —

It means that the result is actually true but the system returned false ,

Suppose in a company the security system start beeping that the security has been breached and the system is not safe(negative of , “is system safe?” ) when actually no cyber attack is going on the system .

It is case of False Negative , and come under “ Type II “ errors and are not so much dangerous.

False Positive -

It means the result is actually false but due to the system inefficiency the result shown to you True.

Suppose in a company the system alarm keeps showing you that you are safe , “all is well” and gives Positive message that the system is safe , and suddenly a cyber attack take place and the system is still unable to detect it and the message is still positive , The message of the system should be negative which would tell everyone that be alert the system is under attack , but instead everything is positive .

This type of error comes under Type I error , and is a very dangerous types of error and could cause huge loss to a company and companies are always for a lookout for these types of errors ’cause these types of errors are the man players that ruin the system.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store