Implementation of machine learning and data mining to improve cybersecurity and limit vulnerabilities to cyber attacks

M Alloghani, D Al-Jumeily, A Hussain… - … -inspired computation in …, 2020 - Springer
Of the many challenges that continue to make detection of cyber-attack detection elusive,
lack of training data remains the biggest one. Even though organizations and business turn
to known network monitoring tools such as Wireshark, millions of people are still vulnerable
because of lack of information pertaining to website behaviors and features that can amount
to an attack. In fact, most of the attacks do not occur because of threat actors' resort to
complex coding and evasion techniques but because victims lack the basic tools to detect …

Implementation of machine learning and data mining to improve cybersecurity and limit vulnerabilities to cyber attacks

A Hussain, D Al-Jumeily, T Baker, AJ Aljaaf… - dspace.kpfu.ru
… Of the many challenges that continue to make detection of cyber-attack detection elusive, lack
of training data remains the biggest one. Even though organizations and business turn to known
network monitoring tools such as Wireshark, millions of people are still vulnerable because of
lack of information pertaining to website behaviors and features that can amount to an attack.
In fact, most of the attacks do not occur because of threat actors’ resort to complex coding and
evasion techniques but because victims lack the basic tools to detect and avoid the attacks …
以上显示的是最相近的搜索结果。 查看全部搜索结果