A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Citations
1,123 citations
Cites methods from "A Survey of Data Mining and Machine..."
...RELEVANT WORK In prior studies, a number of approaches based on traditional machine learning, including SVM [10], [11], K-Nearest Neighbour (KNN) [12], ANN [13], Random Forest (RF) [14], [15] and others [16], [17], have been proposed and have achieved success for an intrusion detection system....
[...]
975 citations
684 citations
Cites background or methods from "A Survey of Data Mining and Machine..."
...AIDS methods can be categorized into three main groups: Statistics-based (Chao et al., 2015), knowledgebased (Elhag et al., 2015; Can & Sahingoz, 2015), and machine learning-based (Buczak & Guven, 2016; Meshram & Haas, 2017)....
[...]
...Existing review articles (e.g., such as (Buczak & Guven, 2016; Axelsson, 2000; Ahmed et al., 2016; Lunt, 1988; Agrawal & Agrawal, 2015)) focus on intrusion detection techniques or dataset issue or type of computer attack and IDS evasion....
[...]
...Prior studies such as (Sadotra & Sharma, 2016; Buczak & Guven, 2016) have not completely reviewed IDSs in term of the datasets, challenges and techniques....
[...]
677 citations
Cites background from "A Survey of Data Mining and Machine..."
...More recently, [82] looked at the application of Data Mining and ML for cyber-security intrusion detection....
[...]
...[82], both state-of-theart surveys, have a specialized treatment of ML to specific problems in networking....
[...]
...Previous surveys [82, 161, 447] looked at the application of ML for cyber-security....
[...]
...Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different....
[...]
676 citations
References
30 citations
"A Survey of Data Mining and Machine..." refers background in this paper
...[50], real-time signature generation by an anomaly detector can be an important asset....
[...]
25 citations
"A Survey of Data Mining and Machine..." refers methods in this paper
...An example of an HMM for host intrusion detection is shown in Figure 5 [81]....
[...]
22 citations