Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Yiwei Yang
{"title":"基于机器学习的安全分析方法及区块链在网络安全中的应用综述","authors":"Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Yiwei Yang","doi":"10.1109/SmartBlock52591.2020.00011","DOIUrl":null,"url":null,"abstract":"Contemporarily, two emerging techniques, blockchain, and machine learning are driving dramatic rapid growth in the field of network security. This paper describes a literature review of machine learning approaches for network security analytics and summarizes some applications of blockchain in the field of network security. We first illustrate three types of network security data, including network traffic, software binary, and security logs. Then we discuss the application of machine learning and deep learning approaches to analyze these data. We cover a broad array of attack types, including malware, spam, insider threats, network intrusions. We also summarize some applications and potential development direction of blockchain technology.","PeriodicalId":443121,"journal":{"name":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security\",\"authors\":\"Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Yiwei Yang\",\"doi\":\"10.1109/SmartBlock52591.2020.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Contemporarily, two emerging techniques, blockchain, and machine learning are driving dramatic rapid growth in the field of network security. This paper describes a literature review of machine learning approaches for network security analytics and summarizes some applications of blockchain in the field of network security. We first illustrate three types of network security data, including network traffic, software binary, and security logs. Then we discuss the application of machine learning and deep learning approaches to analyze these data. We cover a broad array of attack types, including malware, spam, insider threats, network intrusions. We also summarize some applications and potential development direction of blockchain technology.\",\"PeriodicalId\":443121,\"journal\":{\"name\":\"2020 3rd International Conference on Smart BlockChain (SmartBlock)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 3rd International Conference on Smart BlockChain (SmartBlock)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartBlock52591.2020.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Smart BlockChain (SmartBlock)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartBlock52591.2020.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security
Contemporarily, two emerging techniques, blockchain, and machine learning are driving dramatic rapid growth in the field of network security. This paper describes a literature review of machine learning approaches for network security analytics and summarizes some applications of blockchain in the field of network security. We first illustrate three types of network security data, including network traffic, software binary, and security logs. Then we discuss the application of machine learning and deep learning approaches to analyze these data. We cover a broad array of attack types, including malware, spam, insider threats, network intrusions. We also summarize some applications and potential development direction of blockchain technology.