A comprehensive survey on identification and analysis of phishing website based on machine learning methods

MH Alkawaz, SJ Steven… - 2021 IEEE 11th IEEE …, 2021 - ieeexplore.ieee.org
Phishing is a cybercrime which is carried out by imitating a legal website to trick users to
steal their personal data, including usernames, passwords, account numbers, national …

Combining k-means and xgboost models for anomaly detection using log datasets

J Henriques, F Caldeira, T Cruz, P Simões - Electronics, 2020 - mdpi.com
Computing and networking systems traditionally record their activity in log files, which have
been used for multiple purposes, such as troubleshooting, accounting, post-incident …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

An integrated method for anomaly detection from massive system logs

Z Liu, T Qin, X Guan, H Jiang, C Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Logs are generated by systems to record the detailed runtime information about system
operations, and log analysis plays an important role in anomaly detection at the host or …

Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things

P Wu, Z Lu, Q Zhou, Z Lei, X Li, M Qiu… - Future Generation …, 2019 - Elsevier
While bigdata system processes high-volume data at high speed, it also generates a large
amount of logs. However, it is hard for people to predict future events based on massive …

Big-data analysis of multi-source logs for anomaly detection on network-based system

Z Jia, C Shen, X Yi, Y Chen, T Yu… - 2017 13th IEEE …, 2017 - ieeexplore.ieee.org
Log data are important audit basis to record routine events occurring on computer or
network system, which are also critical data source for detecting system anomalies. By …

An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure

S Eswaran, V Rani, J Ramakrishnan… - International Journal of …, 2022 - emerald.com
Purpose In the recent era, banking infrastructure constructs various remotely handled
platforms for users. However, the security risk toward the banking sector has also elevated …

An approach to the correlation of security events based on machine learning techniques

K Stroeh, ER Mauro Madeira… - Journal of Internet Services …, 2013 - Springer
Organizations face the ever growing challenge of providing security within their IT
infrastructures. Static approaches to security, such as perimetral defense, have proven less …

An unsupervised heterogeneous log-based framework for anomaly detection

AI Hajamydeen, NI Udzir, R Mahmod… - Turkish Journal of …, 2016 - journals.tubitak.gov.tr
Log analysis is a method to identify intrusions at the host or network level by scrutinizing the
log events recorded by the operating systems, applications, and devices. Most work …

Indoor intrusion detection and filtering system using raspberry Pi

UNA Razimi, MH Alkawaz… - 2020 16th IEEE …, 2020 - ieeexplore.ieee.org
Recently, the current available surveillance technology still lacking in many aspect
especially in terms of price and the flexibility of the alert system. In this modern living styles …