Journal ArticleDOI
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak,Erhan Guven +1 more
TLDR
The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/ DM for cyber security is presented, and some recommendations on when to use a given method are provided.Abstract:
This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial descriptions of each ML/DM method are provided. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided.read more
Citations
More filters
Proceedings ArticleDOI
Impact of Machine Learning in Various Network Security Applications
Jayashree Banerjee,Sumana Maiti,Sumalya Chakraborty,Surajit Dutta,Arpita Chakraborty,Jyoti Sekhar Banerjee +5 more
TL;DR: This paper represents a converged exposition of machine learning approach on various network security applications specifying the possible future scope and detailed outcome of the researches on the basis of intrusion detection, analysis of malware behavior, internet traffic classification, and other security aspects.
Journal ArticleDOI
A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
TL;DR: This study examines the broader security incident response perspective from a standardization perspective, introducing 18 core concepts and providing a detailed analysis of 6 incident response formats.
Journal ArticleDOI
Intrusion detection based on Machine Learning techniques in computer networks
TL;DR: A comprehensive survey of ML-based intrusion detection approaches presented in the literature in the last ten years can be found in this article, where the authors present a comprehensive critical survey of machine learning techniques used for intrusion detection.
Journal ArticleDOI
Adaptive security-related data collection with context awareness
Huaqing Lin,Zheng Yan,Yulong Fu +2 more
TL;DR: The proposed collector solves the issue of heterogeneity of network system by designing a Security-related Data Description Language (SDDL) to instruct security related data collection in various networking contexts and applies adaptive sampling algorithms to reduce the amount of collected data.
Journal ArticleDOI
A survey on analysis and detection of Android ransomware
TL;DR: This article provides a comprehensive survey on analysis and detection methods for Android ransomware since its beginning (2015) till date (2020); but also presents observations and suggestions for researchers and practitioners to carry out further research.
References
More filters
Journal ArticleDOI
Random Forests
TL;DR: Internal estimates monitor error, strength, and correlation and these are used to show the response to increasing the number of features used in the forest, and are also applicable to regression.
Book
Fuzzy sets
TL;DR: A separation theorem for convex fuzzy sets is proved without requiring that the fuzzy sets be disjoint.
Journal ArticleDOI
Maximum likelihood from incomplete data via the EM algorithm
Book
The Nature of Statistical Learning Theory
TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI
Collective dynamics of small-world networks
TL;DR: Simple models of networks that can be tuned through this middle ground: regular networks ‘rewired’ to introduce increasing amounts of disorder are explored, finding that these systems can be highly clustered, like regular lattices, yet have small characteristic path lengths, like random graphs.
Related Papers (5)
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Robin Sommer,Vern Paxson +1 more