{"title":"恶意网络活动的无监督机器学习","authors":"A. Hassan, Shahzaib Tahir, Ahmed Iftikhar Baig","doi":"10.1109/ICAEM.2019.8853788","DOIUrl":null,"url":null,"abstract":"Increase in cybercrimes in the last few years has dramatically increased the need for the network intrusion detection and subsequently its mitigation. Several classified intrusion detection systems (IDS) are currently in use but increase in dynamics of the cyber invasion hunts for more adaptive and intelligent model. This research covers the critical analysis and comparison of the Machine Learning (ML) network intrusion detection techniques, their use cases and proposes an unsupervised and fast ML implementation model for intrusion detection. The proposed model works on anomaly-based detection. ELK stack (Elasticsearch, Logstash and Kibana) has been used for unsupervised implementation model for exodus DNS requests in a wired network","PeriodicalId":304208,"journal":{"name":"2019 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Unsupervised Machine Learning for Malicious Network Activities\",\"authors\":\"A. Hassan, Shahzaib Tahir, Ahmed Iftikhar Baig\",\"doi\":\"10.1109/ICAEM.2019.8853788\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increase in cybercrimes in the last few years has dramatically increased the need for the network intrusion detection and subsequently its mitigation. Several classified intrusion detection systems (IDS) are currently in use but increase in dynamics of the cyber invasion hunts for more adaptive and intelligent model. This research covers the critical analysis and comparison of the Machine Learning (ML) network intrusion detection techniques, their use cases and proposes an unsupervised and fast ML implementation model for intrusion detection. The proposed model works on anomaly-based detection. ELK stack (Elasticsearch, Logstash and Kibana) has been used for unsupervised implementation model for exodus DNS requests in a wired network\",\"PeriodicalId\":304208,\"journal\":{\"name\":\"2019 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAEM.2019.8853788\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Applied and Engineering Mathematics (ICAEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEM.2019.8853788","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unsupervised Machine Learning for Malicious Network Activities
Increase in cybercrimes in the last few years has dramatically increased the need for the network intrusion detection and subsequently its mitigation. Several classified intrusion detection systems (IDS) are currently in use but increase in dynamics of the cyber invasion hunts for more adaptive and intelligent model. This research covers the critical analysis and comparison of the Machine Learning (ML) network intrusion detection techniques, their use cases and proposes an unsupervised and fast ML implementation model for intrusion detection. The proposed model works on anomaly-based detection. ELK stack (Elasticsearch, Logstash and Kibana) has been used for unsupervised implementation model for exodus DNS requests in a wired network