User profiling in intrusion detection: A review
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …
unauthorised users of a network or system. They observe the actions of the system and its …
A survey on user profiling model for anomaly detection in cyberspace
AH Lashkari, M Chen… - Journal of Cyber …, 2019 - journals.riverpublishers.com
In the face of escalating global Cybersecurity threats, having an automated forewarning
system that can find suspicious user profiles is paramount. It can work as a prevention …
system that can find suspicious user profiles is paramount. It can work as a prevention …
An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity
G Folino, C Otranto Godano, FS Pisani - The Journal of Supercomputing, 2023 - Springer
Nowadays, the speed of the user and application logs is so quick that it is almost impossible
to analyse them in real time without using high-performance systems and platforms. In …
to analyse them in real time without using high-performance systems and platforms. In …
An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge
Bayesian networks are important knowledge representation tools for handling uncertain
pieces of information. The success of these models is strongly related to their capacity to …
pieces of information. The success of these models is strongly related to their capacity to …
Big data analytics for classification of network enabled devices
D Arora, KF Li, A Loffler - 2016 30th International Conference …, 2016 - ieeexplore.ieee.org
As information technology (IT) and telecommunication systems continue to grow in size and
complexity, especially with Internet of Things (IoT) gaining popularity, maintaining a secure …
complexity, especially with Internet of Things (IoT) gaining popularity, maintaining a secure …
Winsorize tree algorithm for handling outlier in classification problem
Classification and regression tree (CART) has been widely used nowadays for providing
users supports in classification and prediction. However, having outlier in database is …
users supports in classification and prediction. However, having outlier in database is …
Intrusion detection system based on multi-strategy pruning algorithm of the decision tree
H Wang, B Chen - … of 2013 IEEE international conference on …, 2013 - ieeexplore.ieee.org
The decision tree is an effective classification method in data mining. Using this method, the
intrusion detection system can be more accurate and efficient to process network data …
intrusion detection system can be more accurate and efficient to process network data …
Revising the outputs of a decision tree with expert knowledge: Application to intrusion detection and alert correlation
S Benferhat, A Boudjelida… - 2012 IEEE 24th …, 2012 - ieeexplore.ieee.org
Classifiers are well-known and efficient techniques used to predict the class of items
descrided by a set of features. In many applications, it is important to take into account some …
descrided by a set of features. In many applications, it is important to take into account some …
A scalable cybersecurity framework for anomaly detection in user behaviour
G Folino, CO Godano, FS Pisani - 2022 - researchsquare.com
Nowadays, the speed of the user and application logs is so quick that it is almost impossible
to analyse them in real-time without using scalable systems and platforms. In cybersecurity …
to analyse them in real-time without using scalable systems and platforms. In cybersecurity …
Semantic correlation for alarms classification in maintenance process
In the scope of maintenance process, alarms triggering and management is an important
issue that diagnosis assistance system must take into account. Alarms floods have always …
issue that diagnosis assistance system must take into account. Alarms floods have always …