Research on Intelligent Detection of Intrusion Data in Network

被引:0
作者
Zhu, Guangjie [1 ]
Yao, Honglei [1 ]
机构
[1] China Acad Railway Sci Corp Ltd, Inst Comp Technol, Beijing, Peoples R China
来源
2020 CHINESE AUTOMATION CONGRESS (CAC 2020) | 2020年
关键词
Network Security; Computation Consumption; Data Mining; Machine Learning;
D O I
10.1109/CAC51589.2020.9326803
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The typical algorithms in machine learning and data mining are described and compared based on the advantages from individual algorithm including computation consumption and computation capacities. Based on the research on the novel academic paper, the problems to be solved are analyzed in network security. Besides, some suggestions are provided to adapt to specific scenarios.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 17 条
  • [1] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [2] Hierarchical Bayesian Network Modeling Framework for Large-Scale Process Monitoring and Decision Making
    Chen, Guangjie
    Ge, Zhiqiang
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2020, 28 (02) : 671 - 679
  • [3] El-Sherif S M, 2019, ARCHITECTURES DETECT, P1
  • [4] Ghosh A, 2019, MAX AFFINE REGRESSIO
  • [5] A min-max regret approach to maximum likelihood inference under incomplete data
    Guillaume, Romain
    Dubois, Didier
    [J]. INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2020, 121 : 135 - 149
  • [6] Intrusion signature creation via clustering anomalies
    Hendry, Gilbert R.
    Yang, Shanchieh J.
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [7] Joshi S., 2005, Proceedings of the 43rd annual Southeast regional conference-Volume, P98
  • [8] Kebande V R, 2019, WILEY INTERDIPLINARY, V1
  • [9] Bayesian event classification for intrusion detection
    Kruegel, C
    Mutz, D
    Robertson, W
    Valeur, F
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 14 - 23
  • [10] Livadas C, 2006, CONF LOCAL COMPUT NE, P967