2016
DOI: 10.1201/b10867
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining and Machine Learning in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
303
0
11

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 348 publications
(314 citation statements)
references
References 0 publications
0
303
0
11
Order By: Relevance
“…traffic [4], unpredicted addresses of packets [5], attributes of requests to databases (DB) [6,7], etc. These articles do not take into account the possibility of parallel formation of reference deviations for the features of anomalies and cyber attacks, which increases the time of RO analysis in ASR (or ISDA) [8].…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
See 1 more Smart Citation
“…traffic [4], unpredicted addresses of packets [5], attributes of requests to databases (DB) [6,7], etc. These articles do not take into account the possibility of parallel formation of reference deviations for the features of anomalies and cyber attacks, which increases the time of RO analysis in ASR (or ISDA) [8].…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
“…We accepted that ct a and ct b are the reference vectors of RO classes, in particular, by the KDD Cup 1999 Data [2,5,7].…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
“…Метод построения ансамбля использует весовые коэффициенты, полученные методом роя частиц (particle swarm optimization, PSO), для повышения точности обнаружения вторжений. [9]. В контексте обнаружения вторжений, алгоритмы классификации, как правило, представляют отображение, которое адаптируется к невидимым сетевым аномалиям [24].…”
Section: литературный обзорunclassified
“…Таким образом, когда типы атак не известны априори, что является весьма реалистичным предположением, выбор метода обнаружения атак не прост. Кроме того, масштаб сети является проблемой: при обнаружении атак необходимо учитывать распределение процесса выполнения заданий между несколькими серверами сети с целью увеличения общей производительности и возможность работы системы при отказе отдельных её элементов с учетом роста размеров сетей [8,9].…”
Section: Introductionunclassified
“…ML [25,26] is a branch of artificial intelligence and the main goal of which is the knowledge summarization based on finite number of previous experiences sand finding useful patterns for previously unknown events. The main advantage of ML methods is finding the needed knowledge out of large amounts of data.…”
Section: Ml-based Botnet Detectionmentioning
confidence: 99%