Movatterモバイル変換


[0]ホーム

URL:


Bagui et al., 2019 - Google Patents

Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset

Bagui et al., 2019

ViewPDF
Document ID
14840519545950084883
Author
Bagui S
Kalaimannan E
Bagui S
Nandi D
Pinto A
Publication year
Publication venue
Security and Privacy

External Links

Snippet

This paper uses a hybrid feature selection process and classification techniques to classify cyber‐attacks in the UNSW‐NB15 dataset. A combination of k‐means clustering, and a correlation‐based feature selection, were used to come up with an optimum subset of …
Continue reading atwww.researchgate.net (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6256Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/6292Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6296Graphical models, e.g. Bayesian networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory

Similar Documents

PublicationPublication DateTitle
Bagui et al.Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset
Hindy et al.A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
BijoneA survey on secure network: intrusion detection & prevention approaches
MoustafaDesigning an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
Kumar et al.Intrusion detection systems: a review
Mukkamala et al.Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools
ThomasImproving intrusion detection for imbalanced network traffic
Sakthivelu et al.Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model.
Patgiri et al.Preventing ddos using bloom filter: A survey
WangBig data in intrusion detection systems and intrusion prevention systems
Ozkan-Okay et al.SABADT: hybrid intrusion detection approach for cyber attacks identification in WLAN
HusseinPerformance analysis of different machine learning models for intrusion detection systems
Sree et al.HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
Kumar et al.Detecting intrusions and attacks in the network traffic using anomaly based techniques
Le et al.Unsupervised monitoring of network and service behaviour using self organizing maps
Shushlevska et al.Anomaly detection with various machine learning classification techniques over UNSW-NB15 dataset
Lah et al.Proposed framework for network lateral movement detection based on user risk scoring in siem
Jing et al.DDoS detection based on graph structure features and non‐negative matrix factorization
CatakTwo-layer malicious network flow detection system with sparse linear model based feature selection
Sukhni et al.A systematic analysis for botnet detection using genetic algorithm
Zhang et al.Deep graph embedding for IoT botnet traffic detection
Yong et al.Understanding botnet: From mathematical modelling to integrated detection and mitigation framework
Ramos et al.A Machine Learning Based Approach to Detect Stealthy Cobalt Strike C &C Activities from Encrypted Network Traffic
Kumar et al.Employing Supervised Learning Techniques for DDoS Attack Detection
Kil et al.Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems.

[8]
ページ先頭

©2009-2025 Movatter.jp