Intrusion Learning: An Overview of an Emergent Discipline

被引:0
|
作者
Bailetti, Tony [1 ,2 ,3 ]
Gad, Mahmoud [4 ]
Shah, Ahmed [5 ,6 ]
机构
[1] Carleton Univ, Sch Business, Sprott, Ottawa, ON K1S 5B6, Canada
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[3] Carleton Univ, TIM Program, Ottawa, ON K1S 5B6, Canada
[4] VENUS Cybersecur, Ottawa, ON, Canada
[5] VENUS Cybersecur Corp, Cybersecur Res, Ottawa, ON, Canada
[6] IBM Corp, Bangalore, Karnataka, India
来源
TECHNOLOGY INNOVATION MANAGEMENT REVIEW | 2016年
关键词
cybersecurity; intrusion learning; intrusion detection; machine learning; learning algorithms; adversarial learning; clustering; streaming network data; real-time analysis; enterprise; security; resiliency;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [31] Deep Learning vs. Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study
    Ali, Md Liakat
    Thakur, Kutub
    Schmeelk, Suzanna
    Debello, Joan
    Dragos, Denise
    APPLIED SCIENCES-BASEL, 2025, 15 (04):
  • [32] An Intrusion Detection Method for Industrial Control System Based on Machine Learning
    Cao, Yixin
    Zhang, Lei
    Zhao, Xiaosong
    Jin, Kai
    Chen, Ziyi
    INFORMATION, 2022, 13 (07)
  • [33] Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data
    Verkerken, Miel
    D'hooge, Laurens
    Wauters, Tim
    Volckaert, Bruno
    De Turck, Filip
    2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
  • [34] A Continuous Learning Approach for Real-Time Network Intrusion Detection
    Martina, Marcello Rinaldo
    Foresti, Gian Luca
    INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2021, 31 (12)
  • [35] Reducing overfitting in deep learning intrusion detection for power systems with CTGAN
    Agarwal, Lalit
    Jaint, Bhavnesh
    Mandpura, Anup K.
    CHAOS SOLITONS & FRACTALS, 2024, 188
  • [36] Deep Learning-Based Intrusion Detection Systems: A Systematic Review
    Lansky, Jan
    Ali, Saqib
    Mohammadi, Mokhtar
    Majeed, Mohammed Kamal
    Karim, Sarkhel H. Taher
    Rashidi, Shima
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    IEEE ACCESS, 2021, 9 : 101574 - 101599
  • [37] Autonomous Federated Learning for Distributed Intrusion Detection Systems in Public Networks
    Mahmoodi, Alireza Bakhshi Zadi
    Sheikhi, Saeid
    Peltonen, Ella
    Kostakos, Panos
    IEEE ACCESS, 2023, 11 : 121325 - 121339
  • [38] A Survey of Machine Learning-based loT Intrusion Detection Techniques
    Long, Jing
    Fang, Fei
    Luo, Haibo
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 7 - 12
  • [39] Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV
    Sahbi, Amina
    Jaidi, Faouzi
    Bouhoula, Adel
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 602 - 607
  • [40] Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
    Dong, Huiyao
    Kotenko, Igor
    KNOWLEDGE AND INFORMATION SYSTEMS, 2025, : 3915 - 3966