2021
DOI: 10.31854/2307-1303-2021-9-4-49-55
|View full text |Cite
|
Sign up to set email alerts
|

Visualization and Processing of Information Security Events Based on Cicids Data 17

Abstract: At present, attacks on computer networks continue to develop at a speed that outstrips the ability of information security specialists to create new attack signatures. This article illustrates an approach to preprocessing raw data and visualizing information security events in a live dataset. It is shown how preprocessing and primary knowledge extraction for further use of the processed dataset in machine learning models can be used in the design of machine learning models for intrusion detection systems. A di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
0
0
Order By: Relevance
“…Another critical step is to examine the data for anomalies or outliers that can skew the work's findings. This might comprise looking for patterns or anomalies in the data visually or using statistical methods to identify outliers [44]. To guarantee that all characteristics are on the same scale and increase the model's accuracy, the data must be normalized.…”
Section: Data Pre-processingmentioning
confidence: 99%
“…Another critical step is to examine the data for anomalies or outliers that can skew the work's findings. This might comprise looking for patterns or anomalies in the data visually or using statistical methods to identify outliers [44]. To guarantee that all characteristics are on the same scale and increase the model's accuracy, the data must be normalized.…”
Section: Data Pre-processingmentioning
confidence: 99%