Unsupervised machine learning for networking: Techniques, applications and research challenges
While machine learning and artificial intelligence have long been applied in networking
research, the bulk of such works has focused on supervised learning. Recently, there has …
research, the bulk of such works has focused on supervised learning. Recently, there has …
Surveying port scans and their detection methodologies
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port
scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is …
scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is …
Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …
V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
Adversarial Reconnaissance Mitigation and Modeling
Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables
threat actors to find the weakest points of otherwise well-defended systems. To thwart …
threat actors to find the weakest points of otherwise well-defended systems. To thwart …
On the use of naive bayesian classifiers for detecting elementary and coordinated attacks
Bayesian networks are very powerful tools for knowledge representation and reasoning
under uncertainty. This paper shows the applicability of naive Bayesian classifiers to two …
under uncertainty. This paper shows the applicability of naive Bayesian classifiers to two …
Effectively mining network traffic intelligence to detect malicious stealthy port scanning to cloud servers
YZ Qu, QK Lu - 網際網路技術學刊, 2014 - airitilibrary.com
Cloud computing provides a paradigm to enable convenient and on-demand network
access to a shared pool of configurable computing resources. The security challenges …
access to a shared pool of configurable computing resources. The security challenges …
Ensemble machine learning approach for network intrusion detection
MR Al-Masud - 2019 - lib.buet.ac.bd
Due to increasing amount of cyber attack, there is a growing demand for Network intrusion
detection systems (NIDSs) which are necessary for defending from potential attacks. Cyber …
detection systems (NIDSs) which are necessary for defending from potential attacks. Cyber …
[PDF][PDF] Modeling and recognizing network scanning activities with finite mixture models and hidden Markov models
G De Santis - Universite de Lorraine, 2018 - docnum.univ-lorraine.fr
The objective of this chapter is to provide a general overview of Network Scanning Activities
(NSAs). It describes who are their performers and targets, distinguishes them between …
(NSAs). It describes who are their performers and targets, distinguishes them between …
Учредители: Научно-исследовательский клуб «Парадигма», Жеребило Татьяна Васильевна
АВ ТИХОНОВ, КС ШЕВЧЕНКО, ДМ АСТАНИН - РЕФЛЕКСИЯ Учредители … - elibrary.ru
Культурно-историческое наследие России нуждается в комплексной поддержке со
стороны государства и бизнеса. Множество значительных архитектурных комплексов …
стороны государства и бизнеса. Множество значительных архитектурных комплексов …
Naïve Bayesian based Temperature and Energy Aware Scheduling of Heterogeneous Processors
R Kabir, B Izadi - 2019 Tenth International Green and …, 2019 - ieeexplore.ieee.org
Directed acyclic graph (DAG) is a popular representation of an application, which includes
application characteristics such as task dependencies, task execution time and inter …
application characteristics such as task dependencies, task execution time and inter …