A survey of data mining and machine learning methods for cyber security intrusion detection

AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …

A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arxiv preprint arxiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

Sonata: Query-driven streaming network telemetry

A Gupta, R Harrison, M Canini, N Feamster… - Proceedings of the …, 2018 - dl.acm.org
Managing and securing networks requires collecting and analyzing network traffic data in
real time. Existing telemetry systems do not allow operators to express the range of queries …

[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale

A Oest, P Zhang, B Wardman, E Nunes… - 29th {USENIX} Security …, 2020 - usenix.org
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …

Boosting algorithms for network intrusion detection: A comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost

A Shahraki, M Abbasi, Ø Haugen - Engineering Applications of Artificial …, 2020 - Elsevier
Computer networks have been experienced ever-increasing growth since they play a critical
role in different aspects of human life. Regarding the vulnerabilities of computer networks …

Detection of malicious web activity in enterprise computer networks

AM Oprea, Z Li, R Norris, KD Bowers - US Patent 9,838,407, 2017 - Google Patents
(57) ABSTRACT A processing device in one embodiment comprises a pro cessor coupled to
a memory and is configured to obtain internal log data of a computer network of an …

Botnet attack detection in Internet of Things devices over cloud environment via machine learning

M Waqas, K Kumar, AA Laghari… - Concurrency and …, 2022 - Wiley Online Library
With the arrival of the Internet of Things (IoT) many devices such as sensors, nowadays can
communicate with each other and share data easily. However, the IoT paradigm is prone to …

Identifying encrypted malware traffic with contextual flow data

B Anderson, D McGrew - Proceedings of the 2016 ACM workshop on …, 2016 - dl.acm.org
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …