Handbook of Research on Machine and Deep Learning Applications for Cyber Security最新文献

筛选
英文 中文
Applications of Machine Learning in Cyber Security 机器学习在网络安全中的应用
Handbook of Research on Machine and Deep Learning Applications for Cyber Security Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9611-0.CH005
Charu Virmani, Tanu Choudhary, Anuradha Pillai, M. Rani
{"title":"Applications of Machine Learning in Cyber Security","authors":"Charu Virmani, Tanu Choudhary, Anuradha Pillai, M. Rani","doi":"10.4018/978-1-5225-9611-0.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-9611-0.CH005","url":null,"abstract":"With the exponential rise in technological awareness in the recent decades, technology has taken over our lives for good, but with the application of computer-aided technological systems in various domains of our day-to-day lives, the potential risks and threats have also come to the fore, aiming at the various security features that include confidentiality, integrity, authentication, authorization, and so on. Computer scientists the world over have tried to come up, time and again, with solutions to these impending problems. With time, attackers have played out complicated attacks on systems that are hard to comprehend and even harder to mitigate. The very fact that a huge amount of data is processed each second in organizations gave birth to the concept of Big Data, thereby making the systems more adept and intelligent in dealing with unprecedented attacks on a real-time basis. This chapter presents a study about applications of machine learning algorithms in cyber security.","PeriodicalId":354100,"journal":{"name":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Variable Selection Method for Regression Models Using Computational Intelligence Techniques 基于计算智能技术的回归模型变量选择方法
Handbook of Research on Machine and Deep Learning Applications for Cyber Security Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9611-0.CH019
S. Dhamodharavadhani, R. Rathipriya
{"title":"Variable Selection Method for Regression Models Using Computational Intelligence Techniques","authors":"S. Dhamodharavadhani, R. Rathipriya","doi":"10.4018/978-1-5225-9611-0.CH019","DOIUrl":"https://doi.org/10.4018/978-1-5225-9611-0.CH019","url":null,"abstract":"Regression model (RM) is an important tool for modeling and analyzing data. It is one of the popular predictive modeling techniques which explore the relationship between a dependent (target) and independent (predictor) variables. The variable selection method is used to form a good and effective regression model. Many variable selection methods existing for regression model such as filter method, wrapper method, embedded methods, forward selection method, Backward Elimination methods, stepwise methods, and so on. In this chapter, computational intelligence-based variable selection method is discussed with respect to the regression model in cybersecurity. Generally, these regression models depend on the set of (predictor) variables. Therefore, variable selection methods are used to select the best subset of predictors from the entire set of variables. Genetic algorithm-based quick-reduct method is proposed to extract optimal predictor subset from the given data to form an optimal regression model.","PeriodicalId":354100,"journal":{"name":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Big Data Analytics With Machine Learning and Deep Learning Methods for Detection of Anomalies in Network Traffic 用机器学习和深度学习方法检测网络流量异常的大数据分析
Handbook of Research on Machine and Deep Learning Applications for Cyber Security Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9611-0.CH015
V. Narayan, D. Shanmugapriya
{"title":"Big Data Analytics With Machine Learning and Deep Learning Methods for Detection of Anomalies in Network Traffic","authors":"V. Narayan, D. Shanmugapriya","doi":"10.4018/978-1-5225-9611-0.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-9611-0.CH015","url":null,"abstract":"Information is vital for any organization to communicate through any network. The growth of internet utilization and the web users increased the cyber threats. Cyber-attacks in the network change the traffic flow of each system. Anomaly detection techniques have been developed for different types of cyber-attack or anomaly strategies. Conventional ADS protect information transferred through the network or cyber attackers. The stable prevention of anomalies by machine and deep-learning algorithms are applied for cyber-security. Big data solutions handle voluminous data in a short span of time. Big data management is the organization and manipulation of huge volumes of structured data, semi-structured data and unstructured data, but it does not handle a data imbalance problem during the training process. Big data-based machine and deep-learning algorithms for anomaly detection involve the classification of decision boundary between normal traffic flow and anomaly traffic flow. The performance of anomaly detection is efficiently increased by different algorithms.","PeriodicalId":354100,"journal":{"name":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134395886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Protocol for High-Dimensional Big Data Providing Data Privacy 提供数据隐私的高维大数据安全协议
Handbook of Research on Machine and Deep Learning Applications for Cyber Security Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9611-0.CH016
J. Anitha, S. Prasad
{"title":"A Secure Protocol for High-Dimensional Big Data Providing Data Privacy","authors":"J. Anitha, S. Prasad","doi":"10.4018/978-1-5225-9611-0.CH016","DOIUrl":"https://doi.org/10.4018/978-1-5225-9611-0.CH016","url":null,"abstract":"Due to recent technological development, a huge amount of data generated by social networking, sensor networks, internet, etc., adds more challenges when performing data storage and processing tasks. During PPDP, the collected data may contain sensitive information about the data owner. Directly releasing this for further processing may violate the privacy of the data owner, hence data modification is needed so that it does not disclose any personal information. The existing techniques of data anonymization have a fixed scheme with a small number of dimensions. There are various types of attacks on the privacy of data like linkage attack, homogeneity attack, and background knowledge attack. To provide an effective technique in big data to maintain data privacy and prevent linkage attacks, this paper proposes a privacy preserving protocol, UNION, for a multi-party data provider. Experiments show that this technique provides a better data utility to handle high dimensional data, and scalability with respect to the data size compared with existing anonymization techniques.","PeriodicalId":354100,"journal":{"name":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130703174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信