2020 International Conference on Information Networking (ICOIN) 2020
DOI: 10.1109/icoin48656.2020.9016500
|View full text |Cite
|
Sign up to set email alerts
|

Combining Machine Learning and Behavior Analysis Techniques for Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…However, the high degree of heterogeneity [3] that characterizes this environment makes this operation very difficult, due to both the continuous efforts of the attackers to violate the systems with more and more sophisticated techniques (a case in point is the difficulty of detecting the zero-day attacks [4]), and the problem that many attacks are often characterized by a behavior very similar to that of a legitimate network activity [5], making it difficult to detect them. To face these problems, researchers are constantly looking for more and more efficient Intrusion Detection Systems (IDSs) [6], which are designed using various techniques such as, just to name a few, those based on Machine Learning and Deep Learning [7,8], Artificial Intelligence [9], Artificial Neural Networks [10][11][12][13], Fuzzy Logic [14], often combining more than one to define hybrid solutions [15]. Starting from the consideration that most of the approaches and strategies in the literature related to the IDS domain exploit the entire training set to define the classification model [5,[16][17][18], we have trivially observed that a training dataset refers to single events in terms of data rows and to the different features that characterize each event in terms of data columns.…”
Section: Introductionmentioning
confidence: 99%
“…However, the high degree of heterogeneity [3] that characterizes this environment makes this operation very difficult, due to both the continuous efforts of the attackers to violate the systems with more and more sophisticated techniques (a case in point is the difficulty of detecting the zero-day attacks [4]), and the problem that many attacks are often characterized by a behavior very similar to that of a legitimate network activity [5], making it difficult to detect them. To face these problems, researchers are constantly looking for more and more efficient Intrusion Detection Systems (IDSs) [6], which are designed using various techniques such as, just to name a few, those based on Machine Learning and Deep Learning [7,8], Artificial Intelligence [9], Artificial Neural Networks [10][11][12][13], Fuzzy Logic [14], often combining more than one to define hybrid solutions [15]. Starting from the consideration that most of the approaches and strategies in the literature related to the IDS domain exploit the entire training set to define the classification model [5,[16][17][18], we have trivially observed that a training dataset refers to single events in terms of data rows and to the different features that characterize each event in terms of data columns.…”
Section: Introductionmentioning
confidence: 99%