2022
DOI: 10.1007/s00500-022-06954-8
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattacks detection and analysis in a network log system using XGBoost with ELK stack

Abstract: Noname manuscript No.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…XGBoost is characterized by high accuracy, strong flexibility, and prevention of overfitting. It is often used in data mining [41]. XGBoost belongs to the ensemble learning boosting algorithms, and is composed of multiple Gradient Boosting Decision trees (GBDT).…”
Section: Construction Of Nssa Classifier For the Iiotmentioning
confidence: 99%
“…XGBoost is characterized by high accuracy, strong flexibility, and prevention of overfitting. It is often used in data mining [41]. XGBoost belongs to the ensemble learning boosting algorithms, and is composed of multiple Gradient Boosting Decision trees (GBDT).…”
Section: Construction Of Nssa Classifier For the Iiotmentioning
confidence: 99%
“…Server logs, as primary sources of application activityrelated information, play a key role in the effort to detect and prevent attacks. However, challenges arise in distinguishing between normal and suspicious activities within typically large and heterogeneous server logs [1], [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…Web applications are susceptible to cyber-based attacks, and various security techniques have been developed to protect them. Prevention involves tool utilization, implementing security standards, and regularly assessing risk factors [1][15] [16].…”
Section: Introductionmentioning
confidence: 99%