A survey on application of machine learning for Internet of Things

L Cui, S Yang, F Chen, Z Ming, N Lu, J Qin - International Journal of …, 2018 - Springer
Abstract Internet of Things (IoT) has become an important network paradigm and there are
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …

A survey of itemset mining

P Fournier‐Viger, JCW Lin, B Vo, TT Chi… - … : Data Mining and …, 2017 - Wiley Online Library
Itemset mining is an important subfield of data mining, which consists of discovering
interesting and useful patterns in transaction databases. The traditional task of frequent …

Event labeling combining ensemble detectors and background knowledge

H Fanaee-T, J Gama - Progress in Artificial Intelligence, 2014 - Springer
Event labeling is the process of marking events in unlabeled data. Traditionally, this is done
by involving one or more human experts through an expensive and time-consuming task. In …

An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

Opprentice: Towards practical and automatic anomaly detection through machine learning

D Liu, Y Zhao, H Xu, Y Sun, D Pei, J Luo… - Proceedings of the …, 2015 - dl.acm.org
Closely monitoring service performance and detecting anomalies are critical for Internet-
based services. However, even though dozens of anomaly detectors have been proposed …

Logcluster-a data clustering and pattern mining algorithm for event logs

R Vaarandi, M Pihelgas - 2015 11th International conference …, 2015 - ieeexplore.ieee.org
Modern IT systems often produce large volumes of event logs, and event pattern discovery is
an important log management task. For this purpose, data mining methods have been …

Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks

TF Yen, A Oprea, K Onarlioglu, T Leetham… - Proceedings of the 29th …, 2013 - dl.acm.org
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …

Disclosure: detecting botnet command and control servers through large-scale netflow analysis

L Bilge, D Balzarotti, W Robertson, E Kirda… - Proceedings of the 28th …, 2012 - dl.acm.org
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …

Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking

R Fontugne, P Borgnat, P Abry, K Fukuda - Proceedings of the 6th …, 2010 - dl.acm.org
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult
due to the lack of ground truth. The goal of the present article is to assist researchers in the …

[PDF][PDF] {SEPIA}:{Privacy-Preserving} aggregation of {Multi-Domain} network events and statistics

M Burkhart, M Strasser, D Many… - 19th USENIX Security …, 2010 - usenix.org
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data
of multiple parties. Although MPC has been studied substantially, building solutions that are …