2016
DOI: 10.1007/978-3-319-44257-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Analytics for Network Security: A Survey and Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Furthermore, we have only mentioned those classifiers that were selected as best classifiers for a study because most of the studies initially tried out multiple classifiers. Considering the reflections from learning type, we classified the classifier structure into four types: base, Amnesia testbed dataset [125] , SQLMAP [126] [S59, S62, S70] Malware/RAT ESET NOD32 [127], Kingsoft [128], Anubis [129], VirusTotal [130], [S1, S41] APT Sysmon Tool [131], Winlogbeat [132] [S79] Overt Channels ZeuS Tracker [133], Waledac [134], Storm [135] [S22, S39] Side Channel PAPI [136] [S8, S63] Steganography F5 [137], Model Based Steganography [138], Outguess [139], YASS [140] [S3, S9, S20] Data dns2tcp [141],BRO [142],Iodine [143], dnscat [144] and Ozymandns [145], [S4, S14, S15, S21, Tunnelling CobaltStrike [146], ReverseDNShell [147] S29, S32, S67, S68,S80] Fig. 10: Analysis of ML Modelling Phase (The number shows the total studies in each category, while the bold number shows total studies in terms of y-axis) that can handle linear, non-linear, high dimensional data [154].…”
Section: Sql Injectionmentioning
confidence: 99%
“…Furthermore, we have only mentioned those classifiers that were selected as best classifiers for a study because most of the studies initially tried out multiple classifiers. Considering the reflections from learning type, we classified the classifier structure into four types: base, Amnesia testbed dataset [125] , SQLMAP [126] [S59, S62, S70] Malware/RAT ESET NOD32 [127], Kingsoft [128], Anubis [129], VirusTotal [130], [S1, S41] APT Sysmon Tool [131], Winlogbeat [132] [S79] Overt Channels ZeuS Tracker [133], Waledac [134], Storm [135] [S22, S39] Side Channel PAPI [136] [S8, S63] Steganography F5 [137], Model Based Steganography [138], Outguess [139], YASS [140] [S3, S9, S20] Data dns2tcp [141],BRO [142],Iodine [143], dnscat [144] and Ozymandns [145], [S4, S14, S15, S21, Tunnelling CobaltStrike [146], ReverseDNShell [147] S29, S32, S67, S68,S80] Fig. 10: Analysis of ML Modelling Phase (The number shows the total studies in each category, while the bold number shows total studies in terms of y-axis) that can handle linear, non-linear, high dimensional data [154].…”
Section: Sql Injectionmentioning
confidence: 99%
“…With the evolution of open source Hadoop infrastructure, big data analysis has become easier, faster and near-real-time, thus, making possible the mining of large amount of data using machine learning to find correlation among various components of the network data including but not limited to network packet captures, firewall log and operating system logs. [267].…”
Section: Cognitive Cyber Kill Chainmentioning
confidence: 99%
“…These approaches are often highly interactive, and applications may range from simple data exploration and visualization to pattern recognition and model development. They have been used to study a variety of problems from land use change and text mining to intelligent transportation and network security (e.g., [6][7][8]). Szewrański et al [9] demonstrate the utility of combining GIS and business intelligence (BI) to enhance visual data discovery by linking ArcGIS and Tableau.…”
Section: Introductionmentioning
confidence: 99%