scispace - formally typeset
Journal ArticleDOI

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

TLDR
The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/ DM for cyber security is presented, and some recommendations on when to use a given method are provided.
Abstract
This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial descriptions of each ML/DM method are provided. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided.

read more

Citations
More filters
Book ChapterDOI

Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning

TL;DR: This paper proposes an intrusion detection method based on deep learning and transfer learning, which transforms the intrusion detection problem into image recognition problem and is more efficient and robust than the mainstream machine learning and deep learning methods.
Journal ArticleDOI

A statistical class center based triangle area vector method for detection of denial of service attacks

TL;DR: A class center based triangle area vector (CCTAV) method which computes the mean of target classes individually and extracts the correlation between features and reduces the complexity of feature extraction and enhances the attack detection process.
Journal ArticleDOI

Anomaly detection in smart card logs and distant evaluation with Twitter: a robust framework

TL;DR: This paper defines an anomaly as any perturbation in the transportation network with respect to a typical day: temporary interruption, intermittent habit shifts, closed stations, unusual high/low number of entrances in a station.
Journal ArticleDOI

A robust domain partitioning intrusion detection method

TL;DR: A robust algorithm Sample-Measure-Assess (SMA) that detects intrusion based on rules learnt from multiple samples and yields robust parameters and provides a generalisation that can be monitored and adapted to specific low levels of variability is proposed.
Journal ArticleDOI

Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model

TL;DR: In this article , the authors used the CIC-DDoS2019 dataset to design a proposal for detecting different types of DDoS attacks, which achieved a score of 100% with respect to all evaluation metrics.
References
More filters
Journal ArticleDOI

Random Forests

TL;DR: Internal estimates monitor error, strength, and correlation and these are used to show the response to increasing the number of features used in the forest, and are also applicable to regression.
Book

Fuzzy sets

TL;DR: A separation theorem for convex fuzzy sets is proved without requiring that the fuzzy sets be disjoint.
Book

The Nature of Statistical Learning Theory

TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI

Collective dynamics of small-world networks

TL;DR: Simple models of networks that can be tuned through this middle ground: regular networks ‘rewired’ to introduce increasing amounts of disorder are explored, finding that these systems can be highly clustered, like regular lattices, yet have small characteristic path lengths, like random graphs.
Related Papers (5)