大数据分布式支持向量机

Baby Nirmala, Raed Abueid, Munef Abdullah Ahmed
{"title":"大数据分布式支持向量机","authors":"Baby Nirmala, Raed Abueid, Munef Abdullah Ahmed","doi":"10.58496/mjbd/2022/002","DOIUrl":null,"url":null,"abstract":"Data mining and machine learning (ML) methods are being used more than ever before in cyber security. The use of machine learning (ML) is one of the potential solutions that may be successful against zero day attacks, starting with the categorization of IP traffic and filtering harmful traffic for intrusion detection. In this field, certain published systematic reviews were taken into consideration. Contemporary systematic reviews may incorporate both older and more recent works in the topic of investigation. All of the papers we looked at were thus recent. Data from 2016 to 2021 were utilized in the study. Both security professionals and hackers use data mining capabilities. Applications for data mining may be used to analyze programme activity, surfing patterns, and other factors to identify potential cyber-attacks in the future. Utilizing statistical traffic features, ML, and data mining approaches, new study is being conducted. This research conducts a concentrated literature review on machine learning and its usage in cyber analytics for email filtering, traffic categorization, and intrusion detection. Each approach was identified and a summary provided based on the relevancy and quantity of citations. Some well-known datasets are also discussed since they are a crucial component of ML techniques. On when to utilize a certain algorithm is also offered some advice. On MODBUS data gathered from a gas pipeline, four ML algorithms have been evaluated. Using ML algorithms, different assaults have been categorized, and then the effectiveness of each approach has been evaluated. This study demonstrates the use of ML and data mining for threat research and detection, with a focus on malware detection with high accuracy and short detection times.","PeriodicalId":325612,"journal":{"name":"Mesopotamian Journal of Big Data","volume":"2677 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Big Data Distributed Support Vector Machine\",\"authors\":\"Baby Nirmala, Raed Abueid, Munef Abdullah Ahmed\",\"doi\":\"10.58496/mjbd/2022/002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data mining and machine learning (ML) methods are being used more than ever before in cyber security. The use of machine learning (ML) is one of the potential solutions that may be successful against zero day attacks, starting with the categorization of IP traffic and filtering harmful traffic for intrusion detection. In this field, certain published systematic reviews were taken into consideration. Contemporary systematic reviews may incorporate both older and more recent works in the topic of investigation. All of the papers we looked at were thus recent. Data from 2016 to 2021 were utilized in the study. Both security professionals and hackers use data mining capabilities. Applications for data mining may be used to analyze programme activity, surfing patterns, and other factors to identify potential cyber-attacks in the future. Utilizing statistical traffic features, ML, and data mining approaches, new study is being conducted. This research conducts a concentrated literature review on machine learning and its usage in cyber analytics for email filtering, traffic categorization, and intrusion detection. Each approach was identified and a summary provided based on the relevancy and quantity of citations. Some well-known datasets are also discussed since they are a crucial component of ML techniques. On when to utilize a certain algorithm is also offered some advice. On MODBUS data gathered from a gas pipeline, four ML algorithms have been evaluated. Using ML algorithms, different assaults have been categorized, and then the effectiveness of each approach has been evaluated. This study demonstrates the use of ML and data mining for threat research and detection, with a focus on malware detection with high accuracy and short detection times.\",\"PeriodicalId\":325612,\"journal\":{\"name\":\"Mesopotamian Journal of Big Data\",\"volume\":\"2677 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mesopotamian Journal of Big Data\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58496/mjbd/2022/002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjbd/2022/002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

数据挖掘和机器学习(ML)方法在网络安全领域的应用比以往任何时候都多。机器学习(ML)的使用是可能成功对抗零日攻击的潜在解决方案之一,从IP流量分类和过滤有害流量进行入侵检测开始。在这个领域,某些已发表的系统评论被考虑在内。当代的系统综述可以在研究的主题中包括较老的和较新的作品。我们看的所有论文都是最近的。该研究使用了2016年至2021年的数据。安全专家和黑客都使用数据挖掘功能。数据挖掘的应用程序可用于分析程序活动、冲浪模式和其他因素,以识别未来潜在的网络攻击。利用统计流量特征、机器学习和数据挖掘方法,正在进行新的研究。本研究对机器学习及其在电子邮件过滤、流量分类和入侵检测等网络分析中的应用进行了集中的文献综述。确定了每种方法,并根据引用的相关性和数量提供了摘要。一些知名的数据集也被讨论,因为它们是机器学习技术的关键组成部分。对于何时使用某一算法也给出了一些建议。在从天然气管道收集的MODBUS数据上,对四种ML算法进行了评估。使用ML算法,对不同的攻击进行了分类,然后对每种方法的有效性进行了评估。本研究展示了机器学习和数据挖掘在威胁研究和检测中的应用,重点是高精度和短检测时间的恶意软件检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Big Data Distributed Support Vector Machine
Data mining and machine learning (ML) methods are being used more than ever before in cyber security. The use of machine learning (ML) is one of the potential solutions that may be successful against zero day attacks, starting with the categorization of IP traffic and filtering harmful traffic for intrusion detection. In this field, certain published systematic reviews were taken into consideration. Contemporary systematic reviews may incorporate both older and more recent works in the topic of investigation. All of the papers we looked at were thus recent. Data from 2016 to 2021 were utilized in the study. Both security professionals and hackers use data mining capabilities. Applications for data mining may be used to analyze programme activity, surfing patterns, and other factors to identify potential cyber-attacks in the future. Utilizing statistical traffic features, ML, and data mining approaches, new study is being conducted. This research conducts a concentrated literature review on machine learning and its usage in cyber analytics for email filtering, traffic categorization, and intrusion detection. Each approach was identified and a summary provided based on the relevancy and quantity of citations. Some well-known datasets are also discussed since they are a crucial component of ML techniques. On when to utilize a certain algorithm is also offered some advice. On MODBUS data gathered from a gas pipeline, four ML algorithms have been evaluated. Using ML algorithms, different assaults have been categorized, and then the effectiveness of each approach has been evaluated. This study demonstrates the use of ML and data mining for threat research and detection, with a focus on malware detection with high accuracy and short detection times.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信