2021
DOI: 10.32604/iasc.2021.016240
|View full text |Cite
|
Sign up to set email alerts
|

AI/ML in Security Orchestration, Automation and Response: Future Research Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
6

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 9 publications
0
22
0
6
Order By: Relevance
“…The dataset is made by collecting datasets from repositories along with the own result obtained from the hybrid analysis. In the first part, logistic regression is supervised classification where our target variable is a discrete value stating whether the application is malicious or not called binary classification [27]. This model uses the sigmoid function given below in the equation.…”
Section: Existing Classifiers 41 Logistic Regressionmentioning
confidence: 99%
“…The dataset is made by collecting datasets from repositories along with the own result obtained from the hybrid analysis. In the first part, logistic regression is supervised classification where our target variable is a discrete value stating whether the application is malicious or not called binary classification [27]. This model uses the sigmoid function given below in the equation.…”
Section: Existing Classifiers 41 Logistic Regressionmentioning
confidence: 99%
“…Next-gen firewalls, include traditional firewalls, combine them with filtering capabilities, network-and port-address translation (NAT), VPN support, and other features. According to [2], the threat detection technology tools mentioned above are unaware of an organization's entire IT ecosystem. Vulnerability detection tools is a software tool that according to the bibliography, there are three major types of analysis tools and techniques for detecting software vulnerabilities: a) static analysis, which examines the system/software without executing it, including examining source code, bytecode, and/or binaries, b) dynamic analysis, which examines the system/software by executing it, giving it specific inputs, and examining results and/or outputs, c) hybrid analysis, combining a, b.…”
Section: State Of the Art Of Tools Used Into Soarmentioning
confidence: 99%
“…DFLabs IncMac SOAR [4], [2] enable the planning and recovery phases through features such as knowledge bases, key performance indicators, and advanced reporting.…”
Section: Soar Solutionsmentioning
confidence: 99%
“…AI/ML-powered defense systems are able to analyze large amount of data and identify suspicious patterns in real-time (or near real-time). The main targets for AI/ML applications include intrusion detection (network-based attacks), phishing and spam (emails), threat detection and characterization, and user behavioral analytics [ 132 ].…”
Section: Potential Enhancements Of Future Siemsmentioning
confidence: 99%