2018
DOI: 10.1155/2018/6383145
|View full text |Cite
|
Sign up to set email alerts
|

Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions

Abstract: As time progresses with vast development of information technology, a large number of industries are more dependent on network connections for sensitive business trading and security matters. Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…e firmware is one technique to protect the system, but nowadays, the external mechanisms have emerged and quickly become popular. One important method for data mining in intrusion detection problem proposed in the literature is to use machine learning techniques [2][3][4][5][6][7][8]. e IDS has monitored directly the network transactions where each transaction is either normal or malicious.…”
Section: Introductionmentioning
confidence: 99%
“…e firmware is one technique to protect the system, but nowadays, the external mechanisms have emerged and quickly become popular. One important method for data mining in intrusion detection problem proposed in the literature is to use machine learning techniques [2][3][4][5][6][7][8]. e IDS has monitored directly the network transactions where each transaction is either normal or malicious.…”
Section: Introductionmentioning
confidence: 99%
“…The flooding attack is a type of network intrusion where the attacker consumes the resources of a system in a network by sending frequent network traffic, resulting in a denial of the resources to the legitimate users. ML approaches have many applications in building intelligent systems that can automate network intrusion mitigation such as distributed DDSA [5]. The applications of ML systems are vital to knowledge discovery (KD) from intrusion data records.…”
Section: Related Workmentioning
confidence: 99%
“…It is important for the managers to learn about these while considering the different challenges in data mining and machine learning for security. As Ahmad et al [16] underscored, a large number of industries are already dependent on network connections, especially those that have sensitive business trading and security matters. In this case, communications and networks are extremely vulnerable to the challenges and threats or risks, such as hacking.…”
Section: Overview Of Android Platform and Securitymentioning
confidence: 99%