2015
DOI: 10.1007/978-3-319-15705-4_19
|View full text |Cite
|
Sign up to set email alerts
|

FP-tree and SVM for Malicious Web Campaign Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Anomalies in traffic flows can be detected in several ways, most often with machine learning and data mining. Machine learning is more common in systems for supporting computer emergency response teams during threat detection [ 17 , 18 ]. Data mining, as presented by Buczak and Guven [ 19 ] or Dua and Du [ 20 ], creates new possibilities for detecting new types of threats and contributes to improving the efficiency and flexibility of anomaly-based IDSs.…”
Section: Related Workmentioning
confidence: 99%
“…Anomalies in traffic flows can be detected in several ways, most often with machine learning and data mining. Machine learning is more common in systems for supporting computer emergency response teams during threat detection [ 17 , 18 ]. Data mining, as presented by Buczak and Guven [ 19 ] or Dua and Du [ 20 ], creates new possibilities for detecting new types of threats and contributes to improving the efficiency and flexibility of anomaly-based IDSs.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to misinformation, divisive information which creates polarized groups is counter to what the political system or a democratic nation needs to thrive [35]. Previous campaign detection has been focused on spam [10] and malware [33,20] in order to protect computer information systems. The most relevant work for campaign detection on social media is by Varol and collaborators [38,15].…”
Section: Related Literaturementioning
confidence: 99%
“…In order to identify malicious web campaigns, Kruczkowski et al [54] constructed a FP-SVM system which employed the FP-growth algorithm and the SVM method. This system could be successfully used to analyze a huge amount of dynamic, heterogenous, unstructured and imbalanced network data.…”
Section: Fp-growthmentioning
confidence: 99%