入侵检测中的机器学习方法综述

Oyeyemi Osho, S. Hong
{"title":"入侵检测中的机器学习方法综述","authors":"Oyeyemi Osho, S. Hong","doi":"10.17577/IJERTV10IS010040","DOIUrl":null,"url":null,"abstract":"This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. For any nation, government, or cities to compete favorably in today’s world, it must operate smart cities and e-government. As trendy as it may seem, it comes with its challenges, which is cyber-attacks. A lot of data is generated due to the communication of technologies involved and lots of data are produced from this interaction. Initial attacks aimed at cyber city were for destruction, this has changed dramatically into revenue generation and incentives. Cyber-attacks have become lucrative for criminals to attack financial institutions and cart away with billions of dollars, led to identity theft and many more cyber terror crimes. This puts an onus on government agencies to forestall the impact or this may eventually ground the economy. The dependence on cyber networked systems is impending and this has brought a rise in cyber threats, cyber criminals have become more inventive in their approach. This proposed dissertation discusses various security attacks classification and intrusion detection tools which can detect intrusion patterns and then forestall a break-in, thereby protecting the system from","PeriodicalId":13986,"journal":{"name":"International Journal of Engineering Research and","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Survey Paper on Machine Learning Approaches to Intrusion Detection\",\"authors\":\"Oyeyemi Osho, S. Hong\",\"doi\":\"10.17577/IJERTV10IS010040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. For any nation, government, or cities to compete favorably in today’s world, it must operate smart cities and e-government. As trendy as it may seem, it comes with its challenges, which is cyber-attacks. A lot of data is generated due to the communication of technologies involved and lots of data are produced from this interaction. Initial attacks aimed at cyber city were for destruction, this has changed dramatically into revenue generation and incentives. Cyber-attacks have become lucrative for criminals to attack financial institutions and cart away with billions of dollars, led to identity theft and many more cyber terror crimes. This puts an onus on government agencies to forestall the impact or this may eventually ground the economy. The dependence on cyber networked systems is impending and this has brought a rise in cyber threats, cyber criminals have become more inventive in their approach. This proposed dissertation discusses various security attacks classification and intrusion detection tools which can detect intrusion patterns and then forestall a break-in, thereby protecting the system from\",\"PeriodicalId\":13986,\"journal\":{\"name\":\"International Journal of Engineering Research and\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering Research and\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17577/IJERTV10IS010040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17577/IJERTV10IS010040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

这个电子文档是一个“活的”模板,它已经在样式表中定义了论文的组成部分[标题,正文,标题等]。在当今世界,任何国家、政府或城市要想在竞争中取得优势,就必须运营智慧城市和电子政务。尽管它看起来很流行,但它也面临着挑战,那就是网络攻击。由于所涉及的技术的交流而产生了大量的数据,并且这种交互产生了大量的数据。最初针对网络城市的攻击是为了破坏,这已经戏剧性地变成了创收和激励。网络攻击已经成为犯罪分子攻击金融机构并带走数十亿美元的利润来源,导致身份盗窃和更多的网络恐怖犯罪。这给政府机构带来了预防影响的责任,否则最终可能会使经济陷入困境。对网络网络系统的依赖迫在眉睫,这带来了网络威胁的上升,网络犯罪分子在他们的方法上变得更加有创造力。本文讨论了各种安全攻击的分类和入侵检测工具,这些工具可以检测入侵模式,然后阻止入侵,从而保护系统免受入侵
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Survey Paper on Machine Learning Approaches to Intrusion Detection
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. For any nation, government, or cities to compete favorably in today’s world, it must operate smart cities and e-government. As trendy as it may seem, it comes with its challenges, which is cyber-attacks. A lot of data is generated due to the communication of technologies involved and lots of data are produced from this interaction. Initial attacks aimed at cyber city were for destruction, this has changed dramatically into revenue generation and incentives. Cyber-attacks have become lucrative for criminals to attack financial institutions and cart away with billions of dollars, led to identity theft and many more cyber terror crimes. This puts an onus on government agencies to forestall the impact or this may eventually ground the economy. The dependence on cyber networked systems is impending and this has brought a rise in cyber threats, cyber criminals have become more inventive in their approach. This proposed dissertation discusses various security attacks classification and intrusion detection tools which can detect intrusion patterns and then forestall a break-in, thereby protecting the system from
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Uçak Çakışma Saptama Ve Çözümleme Problemi için Karma Tam Sayılı Doğrusal Programlama Modeli Yaklaşımı Investigation of Thermal Conductivity Properties of Polymer Based Composites Containing Waste Materials Design and Prototyping of Sensor-based Anti-Theft Security System using Microcontroller Used Vehicles Survival Rates and Their Impacts on Urban Air Quality of Addis Ababa, Ethiopia Political Commitment, Institutional Capacity and Urban Transport Governance Reform in Addis Ababa, Ethiopia
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1