User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …

A survey on user profiling model for anomaly detection in cyberspace

AH Lashkari, M Chen… - Journal of Cyber …, 2019 - journals.riverpublishers.com
In the face of escalating global Cybersecurity threats, having an automated forewarning
system that can find suspicious user profiles is paramount. It can work as a prevention …

An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity

G Folino, C Otranto Godano, FS Pisani - The Journal of Supercomputing, 2023 - Springer
Nowadays, the speed of the user and application logs is so quick that it is almost impossible
to analyse them in real time without using high-performance systems and platforms. In …

An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge

S Benferhat, A Boudjelida, K Tabia, H Drias - Applied intelligence, 2013 - Springer
Bayesian networks are important knowledge representation tools for handling uncertain
pieces of information. The success of these models is strongly related to their capacity to …

Big data analytics for classification of network enabled devices

D Arora, KF Li, A Loffler - 2016 30th International Conference …, 2016 - ieeexplore.ieee.org
As information technology (IT) and telecommunication systems continue to grow in size and
complexity, especially with Internet of Things (IoT) gaining popularity, maintaining a secure …

Winsorize tree algorithm for handling outlier in classification problem

CK Ch'ng, NI Mahat - International Journal of Operational …, 2020 - inderscienceonline.com
Classification and regression tree (CART) has been widely used nowadays for providing
users supports in classification and prediction. However, having outlier in database is …

Intrusion detection system based on multi-strategy pruning algorithm of the decision tree

H Wang, B Chen - … of 2013 IEEE international conference on …, 2013 - ieeexplore.ieee.org
The decision tree is an effective classification method in data mining. Using this method, the
intrusion detection system can be more accurate and efficient to process network data …

Revising the outputs of a decision tree with expert knowledge: Application to intrusion detection and alert correlation

S Benferhat, A Boudjelida… - 2012 IEEE 24th …, 2012 - ieeexplore.ieee.org
Classifiers are well-known and efficient techniques used to predict the class of items
descrided by a set of features. In many applications, it is important to take into account some …

A scalable cybersecurity framework for anomaly detection in user behaviour

G Folino, CO Godano, FS Pisani - 2022 - researchsquare.com
Nowadays, the speed of the user and application logs is so quick that it is almost impossible
to analyse them in real-time without using scalable systems and platforms. In cybersecurity …

Semantic correlation for alarms classification in maintenance process

M Bekkaoui, MH Karray, F Bekaddour… - Electrotehnică …, 2017 - hal.science
In the scope of maintenance process, alarms triggering and management is an important
issue that diagnosis assistance system must take into account. Alarms floods have always …