2015
DOI: 10.7763/ijmlc.2015.v5.497
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Machine Learning Method for Intrusion Detection System on Jubatus

Abstract: Abstract-The network intrusion is becoming a big threat for a lot of companies, organization and so on. Recent intrusions are becoming more clever and difficult to detect. Many of today's intrusion detection systems are based on signature-based. They have good performance for known attacks, but theoretically they are not able to detect unknown attacks. On the other hand, an anomaly detection system can detect unknown attacks and is getting focus recently. We study an anomaly detection system as one application… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Organizations may considerably lower the risk of credential-based attacks by proactively monitoring for credential leaks and deploying security solutions like MFA (Multifactor Authentication). It's critical to keep in mind that monitoring credential leakage is only one component of an all-encompassing cyber security program and should be used in conjunction with other security measures like routine vulnerability scanning, employee training, and incident response planning to make sure the company is adequately protected against cyber threats [82][83][84][85][86].…”
Section: Account Takeover Monitoringmentioning
confidence: 99%
“…Organizations may considerably lower the risk of credential-based attacks by proactively monitoring for credential leaks and deploying security solutions like MFA (Multifactor Authentication). It's critical to keep in mind that monitoring credential leakage is only one component of an all-encompassing cyber security program and should be used in conjunction with other security measures like routine vulnerability scanning, employee training, and incident response planning to make sure the company is adequately protected against cyber threats [82][83][84][85][86].…”
Section: Account Takeover Monitoringmentioning
confidence: 99%
“…We have been developing a cyber-attack detection system that uses machine learning technology [1]. An overview of this system is shown in Fig.…”
Section: Previous Workmentioning
confidence: 99%
“…We are developing a video system that can automatically detect irregular events from video images in real time. In addition, we have been developing a cyber-attack detection system that uses machine learning technology [1]. We have applied this technology in our cyber-attack detection system to video images.…”
Section: Introductionmentioning
confidence: 99%