Cyber threat detection based on artificial neural networks using event profiles
J Lee, J Kim, I Kim, K Han - Ieee Access, 2019 - ieeexplore.ieee.org
… The SIEM system allows the consolidation and comprehensive evaluation of security alerts
and logs collected from network security systems (eg, firewall and IDS / IPS). Particularly with …
and logs collected from network security systems (eg, firewall and IDS / IPS). Particularly with …
Enhancing cyber threat detection through machine learning-based behavioral modeling of network traffic patterns
F Bouchama, M Kamal - International Journal of Business …, 2021 - research.tensorgate.org
… intrusion detection systems fail to detect many modern attacks. This paper explores how
machine learning can enhance cyber threat detection through behavioral modeling of network …
machine learning can enhance cyber threat detection through behavioral modeling of network …
Cyber threat detection using machine learning techniques: A performance evaluation perspective
… Malign intrusions over the computer network and devices are another cyber threat to … and
scan the vulnerabilities of a network or computer system. An intrusion detection system (IDS) is …
scan the vulnerabilities of a network or computer system. An intrusion detection system (IDS) is …
[HTML][HTML] Deep learning for cyber threat detection in IoT networks: A review
A Aldhaheri, F Alwahedi, MA Ferrag, A Battah - Internet of Things and Cyber …, 2023 - Elsevier
… -edge intrusion detection methods for IoT security, anchored … Deep Learning for IoT security
and suggest potential areas for … of computer network security, including intrusion detection. …
and suggest potential areas for … of computer network security, including intrusion detection. …
Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering
V Lakhno - Eastern-European journal of enterprise technologies, 2016 - neliti.com
… Ensuring of information processes’ reliability and security in critical application data …
Integrated repository of security information for network security evaluation [Text] / I. Kotenko…
Integrated repository of security information for network security evaluation [Text] / I. Kotenko…
Improving cyber-threat detection by moving the boundary around the normal samples
… Deep learning allows us to learn accurate threat detection models … cyber-threat detection,
which modifies the training set to reduce data over-fitting when training a deep neural network. …
which modifies the training set to reduce data over-fitting when training a deep neural network. …
Optimal machine learning algorithms for cyber threat detection
HM Farooq, NM Otaibi - 2018 UKSim-AMSS 20th International …, 2018 - ieeexplore.ieee.org
… of cyber-attacks; as well as for subsequent triage and network forensics. In larger enterprises…
of network traffic, conventional statistical tools are insufficient to detect abnormal network …
of network traffic, conventional statistical tools are insufficient to detect abnormal network …
[PDF][PDF] Cyber Threat Detection Based On Artificial Neural Networks Using Event Profiles
M Sravanthi, G Suchithra, P Vennela - ijarst.in
… It is only relevant that this new technology must be investigated for information security
applications. The aim of this paper is to investigate the suitability of deep learning approaches for …
applications. The aim of this paper is to investigate the suitability of deep learning approaches for …
A semantic machine learning algorithm for cyber threat detection and monitoring security
… ; At the same time network forensics and ensuing triage also requires cyber threat detection.
As there … In early stages works like protection tracking including network security is a records …
As there … In early stages works like protection tracking including network security is a records …
{DISTDET}: A {Cost-Effective} Distributed Cyber Threat Detection System
… Similarly, if we consider the acceptable overhead is 3% based on the ratio for information
security investment, for a client host with 4GB RAM and 80GB disk, DISTDET needs to limit the …
security investment, for a client host with 4GB RAM and 80GB disk, DISTDET needs to limit the …
相关搜索
- monitoring security cyber threat detection
- network traffic patterns cyber threat detection
- artificial neural networks cyber threat detection
- cyber threat detection system
- performance evaluation perspective cyber threat detection
- normal samples cyber-threat detection
- network security machine learning
- cyber attacks information security
- deep learning cyber threat detection
- taxonomy of cyber threats
- cyber threat prediction
- threat detection system fuzzy feature clustering
- cybersecurity threat detection
- cyber threat analysis
- cyber threat intelligence
- event profiles cyber threat detection