2019 IEEE 5th International Conference for Convergence in Technology (I2CT) 2019
DOI: 10.1109/i2ct45611.2019.9033737
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Network log data using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…As an example of a binary classification task, Allagi and Rachh [ 47 ] applied the Self-Organizing Feature Map algorithm and K-means to identify anomalies in the access patterns with supervised ML techniques based on the publicly available dataset in the UCI ML repository, while As-Suhbani and Khamitkar [ 48 ] proposed a meta-classifier model with four binary classifiers: K-Nearest Neighbor, Naive Bayes, J48, and One R using the network log dataset.…”
Section: Related Workmentioning
confidence: 99%
“…As an example of a binary classification task, Allagi and Rachh [ 47 ] applied the Self-Organizing Feature Map algorithm and K-means to identify anomalies in the access patterns with supervised ML techniques based on the publicly available dataset in the UCI ML repository, while As-Suhbani and Khamitkar [ 48 ] proposed a meta-classifier model with four binary classifiers: K-Nearest Neighbor, Naive Bayes, J48, and One R using the network log dataset.…”
Section: Related Workmentioning
confidence: 99%
“…The logging reports generated by firewalls have been the subject of extensive research over several decades. To cite a few recent works, Allagi et al [13] developed binary classifiers with Kmeans and Self-Organizing Feature Map (SOFM) algorithms to distinguish between normal and analogous records and achieved an accuracy of 92.7%. Cao et al [14] developed a system that utilizes a two-level approach for detecting anomalies in network log files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Multiple research papers engaged in binary classification of network logs, distinguishing them as either normal or anomalous traffic. Allagi et al [10] investigation made use of a sizable dataset [11] with 22,614,256 records that was made available to the public by the UCI ML repository. K-means was used in their strategy to train the model, and the result was a model with an excellent accuracy of 97.2% and a False Positive Rate (FPR) of 2.7% on the sample dataset.…”
Section: Related Workmentioning
confidence: 99%