Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset

ZK Maseer, R Yusof, N Bahaman, SA Mostafa… - IEEE …, 2021 - ieeexplore.ieee.org
An intrusion detection system (IDS) is an important protection instrument for detecting
complex network attacks. Various machine learning (ML) or deep learning (DL) algorithms …

[PDF][PDF] Обзор методов обнаружения аномалий в потоках данных

ВП Шкодырев, КИ Ягафаров… - Proc. of the Second …, 2017 - ceur-ws.org
В работе приведен обзор существующих методов и алгоритмов обнаружения
аномалий с целью структуризации имеющихся данных и последующего отбора …

Complex event processing for network anomaly detection in digital railway communication services

MA Butakova, AV Chernov… - 2017 25th …, 2017 - ieeexplore.ieee.org
The paper aims to propose a novel approach to rise the situation awareness about
incidents, which can be considered as events in the complex event processing system. The …

[PDF][PDF] A New Hybrid Approach Using GWO and MFO Algorithms to Detect Network Attack.

H Dalmaz, E Erdal, HM Ünver - CMES-Computer Modeling in …, 2023 - cdn.techscience.cn
This paper addresses the urgent need to detect network security attacks, which have
increased significantly in recent years, with high accuracy and avoid the adverse effects of …

A hybrid column and constraint generation method for network behavior anomaly detection

M Deng, X Wu, P Chen, W Zeng - 2020 IEEE 20th International …, 2020 - ieeexplore.ieee.org
One of the more representative tasks to detect large-scale network behavior data is to use
support vector machine (SVM) to extract the characteristics of network data to establish …

[PDF][PDF] Банковские инновации Применение автоматической классификации текстов в малых и средних финансовых организациях

ГВ Ломонос - новая Экономика - neweconomics.by
This article discusses the basic methods for classifying text data and explores the combined
approaches to classifying text. The advantages and disadvantages of each method are …

[引用][C] Современные системы обнаружения вредоносных сообщений электронной почты

ГВ Ломонос, ВА Захарьев - 2023 - БГУИР