2018 3rd International Conference on Inventive Computation Technologies (ICICT) 2018
DOI: 10.1109/icict43934.2018.9034445
|View full text |Cite
|
Sign up to set email alerts
|

A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The key benefits of utilizing the ML method described in this study include the following: the ability to emit criminal strategies, extract complex data relationships, produce results that are impossible for humans to predict, and identify models in both unstructured and structured data. [25,26].…”
Section: Figure 1 the Datasets Use A Variety Of Approaches To Generat...mentioning
confidence: 99%
“…The key benefits of utilizing the ML method described in this study include the following: the ability to emit criminal strategies, extract complex data relationships, produce results that are impossible for humans to predict, and identify models in both unstructured and structured data. [25,26].…”
Section: Figure 1 the Datasets Use A Variety Of Approaches To Generat...mentioning
confidence: 99%
“…NSL_KDD [26], UNSW_NB15 [27] datasets consist of a large number of packets; the first one contains four major attacks, while the second has two million packets and contains nine major attacks. The features of these datasets include TCP/IP header information of TCP/IP suite.…”
Section: Data Sets Descriptionmentioning
confidence: 99%
“…True Negative (TN) is the number of cases successfully forecasted as Normal class in cyber security, while True Positive (TP) is the number of instances correctly predicted as attacks, The number of normal occurrences identified as an attack is known as False Positive (FP), while the number of attack instances classified as normal is known as False Negative (FN). To evaluate the proposed system, standard metrics are used, such as measures like accuracy, precision, recall, and F1 score, while the Silhouette Index measure is presented to evaluate the quality of clusters [27].…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Classification [7][8][9], regression [10], and clustering [4] models have been used to improve the performance and increase the detection rate of intrusion detection systems (IDS). Intrusion data is knowns as stream data with large amounts of data generated at high speed in networking [7].…”
Section: Motivationmentioning
confidence: 99%
“…To overcome these challenges, all evolving methods to add, merge, and delete clusters should be implemented [2,3]. At the same time, the system should learn and adapt to unknown situations and detect potential temporal shifts and data drifts [4]. Cauchy density assigns new samples to clusters or forms new clusters.…”
Section: Introductionmentioning
confidence: 99%