Intrusion Learning: An Overview of an Emergent Discipline

被引:0
|
作者
Bailetti, Tony [1 ,2 ,3 ]
Gad, Mahmoud [4 ]
Shah, Ahmed [5 ,6 ]
机构
[1] Carleton Univ, Sch Business, Sprott, Ottawa, ON K1S 5B6, Canada
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[3] Carleton Univ, TIM Program, Ottawa, ON K1S 5B6, Canada
[4] VENUS Cybersecur, Ottawa, ON, Canada
[5] VENUS Cybersecur Corp, Cybersecur Res, Ottawa, ON, Canada
[6] IBM Corp, Bangalore, Karnataka, India
来源
TECHNOLOGY INNOVATION MANAGEMENT REVIEW | 2016年
关键词
cybersecurity; intrusion learning; intrusion detection; machine learning; learning algorithms; adversarial learning; clustering; streaming network data; real-time analysis; enterprise; security; resiliency;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [41] Toward an Online Anomaly Intrusion Detection System Based on Deep Learning
    Alrawashdeh, Khaled
    Purdy, Carla
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 195 - 200
  • [42] IoTProtect: A Machine-Learning Based IoT Intrusion Detection System
    Alani, Mohammed M.
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 61 - 65
  • [43] Machine learning-based intrusion detection for SCADA systems in healthcare
    Ozturk, Tolgahan
    Turgut, Zeynep
    Akgun, Gokce
    Kose, Cemal
    NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS, 2022, 11 (01):
  • [44] Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1273 - 1281
  • [45] Intrusion Detection by Deep Learning with TensorFlow
    Chockwanich, Navaporn
    Visoottiviseth, Vasaka
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 654 - 659
  • [46] Deep Learning in Intrusion Detection Systems
    Karatas, Gozde
    Demir, Onder
    Sahingoz, Ozgur Koray
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 113 - 116
  • [47] Fast and practical intrusion detection system based on federated learning for VANET
    Chen, Xiuzhen
    Qiu, Weicheng
    Chen, Lixing
    Ma, Yinghua
    Ma, Jin
    COMPUTERS & SECURITY, 2024, 142
  • [48] Explainable Machine Learning for Intrusion Detection
    Bellegdi, Sameh
    Selamat, Ali
    Olatunji, Sunday O.
    Fujita, Hamido
    Krejcar, Ondfrej
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND APPLICATIONS, IEA-AIE 2024, 2024, 14748 : 122 - 134
  • [49] Survey of federated learning in intrusion detection
    Zhang, Hao
    Ye, Junwei
    Huang, Wei
    Liu, Ximeng
    Gu, Jason
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2025, 195
  • [50] Transfer Learning based Intrusion Detection
    Taghiyarrenani, Zahra
    Fanian, Ali
    Mahdavi, Ehsan
    Mirzaei, Abdolreza
    Farsi, Hamed
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2018, : 92 - 97