2019
DOI: 10.1155/2019/5826737
|View full text |Cite
|
Sign up to set email alerts
|

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Abstract: Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. Innovative approaches to handle this challenge are undertaken by the scientific community, proposing the utilization of the emerging, advanced machine learning methods. This very paper puts forward a novel approach to the detection of cyberattacks taking inventory of the practical application of infor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Cyber-attacks, introduced by external attackers, could cause negative impact on the communication channels and deteriorate system stability performance. us, it has attracted much attention to study the control and ltering problems for CPSs under the threats of network attacks [4][5][6][7]. e two representative kinds of cyber-attacks are, namely, deception attacks and denial-of-service (DoS) attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber-attacks, introduced by external attackers, could cause negative impact on the communication channels and deteriorate system stability performance. us, it has attracted much attention to study the control and ltering problems for CPSs under the threats of network attacks [4][5][6][7]. e two representative kinds of cyber-attacks are, namely, deception attacks and denial-of-service (DoS) attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Cruz-Vega et al [12] the proposed method of the granular modeling with the fuzzy aptitude based eluding the unnecessary evaluation of the solutions that are not in proximity with the optimal solutions. Fujita et al [13] the paper presents the granular computing integrated with the system for the resilience analysis to have a rapid decision making on the time of disasters Kozik et al [14] the author utilizes the information granules for the detection of the cyber-attacks and discusses the feasibility of utilizing the granules in the cyber-attacks. Bailey et al [15] the analytical model for processing of the input data stream is investigated to input, output and the action, for the granular performance analysis of metrics and diagnostics in trouble shooting.…”
Section: Introductionmentioning
confidence: 99%