A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Citations
1,123 citations
Cites methods from "A Survey of Data Mining and Machine..."
...RELEVANT WORK In prior studies, a number of approaches based on traditional machine learning, including SVM [10], [11], K-Nearest Neighbour (KNN) [12], ANN [13], Random Forest (RF) [14], [15] and others [16], [17], have been proposed and have achieved success for an intrusion detection system....
[...]
975 citations
684 citations
Cites background or methods from "A Survey of Data Mining and Machine..."
...AIDS methods can be categorized into three main groups: Statistics-based (Chao et al., 2015), knowledgebased (Elhag et al., 2015; Can & Sahingoz, 2015), and machine learning-based (Buczak & Guven, 2016; Meshram & Haas, 2017)....
[...]
...Existing review articles (e.g., such as (Buczak & Guven, 2016; Axelsson, 2000; Ahmed et al., 2016; Lunt, 1988; Agrawal & Agrawal, 2015)) focus on intrusion detection techniques or dataset issue or type of computer attack and IDS evasion....
[...]
...Prior studies such as (Sadotra & Sharma, 2016; Buczak & Guven, 2016) have not completely reviewed IDSs in term of the datasets, challenges and techniques....
[...]
677 citations
Cites background from "A Survey of Data Mining and Machine..."
...More recently, [82] looked at the application of Data Mining and ML for cyber-security intrusion detection....
[...]
...[82], both state-of-theart surveys, have a specialized treatment of ML to specific problems in networking....
[...]
...Previous surveys [82, 161, 447] looked at the application of ML for cyber-security....
[...]
...Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different....
[...]
676 citations
References
[...]
79,257 citations
"A Survey of Data Mining and Machine..." refers methods in this paper
...The Random Forest classifier [61] is an ML method that combines the decision trees and ensemble learning....
[...]
[...]
52,705 citations
40,147 citations
"A Survey of Data Mining and Machine..." refers methods in this paper
...The approach is based on a minimized classification risk [95] rather than on optimal classi-...
[...]
39,297 citations
"A Survey of Data Mining and Machine..." refers background in this paper
...The local clustering coefficient of a node is defined as the ratio of the number of sub-graphs with three edges and three vertices that the node is part of to the number of triples which the node is part of [49]....
[...]