[PDF][PDF] Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.

M Komisarek, M Pawlicki, R Kozik… - J. Wirel. Mob. Networks …, 2021 - isyou.info
M Komisarek, M Pawlicki, R Kozik, M Choras
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021isyou.info
In this paper, the performance of a solution providing stream processing is evaluated, and its
accuracy in the classification of suspicious flows in simulated network traffic is investigated.
The concept of the solution is fully disclosed along with its initial evaluation in a real-world
environment. The proposition features Apache Kafka for efficient communication among
different applications, along with Elasticsearch and Kibana as storage and visualisation
solutions. At the heart of the engine are machine learning algorithms implemented using the …
Abstract
In this paper, the performance of a solution providing stream processing is evaluated, and its accuracy in the classification of suspicious flows in simulated network traffic is investigated. The concept of the solution is fully disclosed along with its initial evaluation in a real-world environment. The proposition features Apache Kafka for efficient communication among different applications, along with Elasticsearch and Kibana as storage and visualisation solutions. At the heart of the engine are machine learning algorithms implemented using the TensorFlow library, providing the cutting edge in network intrusion detection. The tool allows easy definition of streams and implementation of any machine learning algorithm.
isyou.info
以上显示的是最相近的搜索结果。 查看全部搜索结果