The majority of cyber infiltration & exfiltration intrusions leave a network footprint, and due to the multi-faceted nature of detecting network intrusions, it is often difficult to detect. In this work a Zeek-processed PCAP dataset containing the metadata of 36,667 network packets was modeled with several machine learning algorithms to classify normal vs. anomalous network activity. Principal component analysis with a 10% contamination factor was used to identify anomalous behavior. Models were created using recursive feature elimination on logistic regression and XGBClassifier algorithms, and also using Bayesian and bandit optimization of neural network hyperparameters. These models were trained on a dataset with numeric features, and als...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
Adversaries are always probing for vulnerable spots on the Internet so they can attack their target....
The use of machine-learning techniques is becoming more and more frequent in solving all those probl...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
A classical multilayer perceptron algorithm and novel convolutional neural network payload classifyi...
This paper demonstrates how different machine learning techniques performed on a recent, partially l...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
In this research we compare different methods to examine network packets using supervised learning t...
To address the evolving strategies and techniques employed by hackers, intrusion detection systems (...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying g...
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vuln...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
Adversaries are always probing for vulnerable spots on the Internet so they can attack their target....
The use of machine-learning techniques is becoming more and more frequent in solving all those probl...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
A classical multilayer perceptron algorithm and novel convolutional neural network payload classifyi...
This paper demonstrates how different machine learning techniques performed on a recent, partially l...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
In this research we compare different methods to examine network packets using supervised learning t...
To address the evolving strategies and techniques employed by hackers, intrusion detection systems (...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying g...
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vuln...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...