Open Access Open Access  Restricted Access Subscription Access

Monitoring of Network and Computer Security Using Semantic Machine Learning

B. Veena, G. Sunil Kumar

Abstract


In order to protect the availability and integrity of digital community information, there is security measures put in place. Typically, protection measures for information will prevent individuals from accessing, disclosing, modifying, or even destroying facts on both software and hardware technologies. New cyber-attacks keep coming up in all business processes, according to an evaluation done by industry experts in the place of information security. An analysis of the level of risk, after all the data had been analysed, has shown that although it is not extremely dangerous in the majority of cases, it is highly dangerous for valuable data and the severity of those attacks is prolonged. Various layers of protection have already been implemented to identify and guard against various cyber-threats, mainly using a processed data feed or alert for revealing each deterministic and stochastic behaviour. Deterministic patterns in cyber-attacks have revealed that they are neither random nor unbiased over time. Assaults that occurred in the past provide a forecasting range for future assaults. Generally speaking, the deterministic styles can be used to create slightly accurate monitoring.


Full Text:

PDF

References


Ye, X., Zhao, J., Zhang, Y., & Wen, F. (2015). Quantitative vulnerability assessment of cyber security for distribution automation systems. Energies, 8(6), 5266-5286.

Waters, G., & Blackburn, J. (2011). Optimizing Australia's response to the cyber challenge.

Anderson, H. S., & Roth, P. (2018). Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637.

Shalaginov, A., Banin, S., Dehghantanha, A., & Franke, K. (2018). Machine learning aided static malware analysis: A survey and tutorial. Cyber threat intelligence, 7-45.

Sahoo, D., Liu, C., & Hoi, S. C. (2017). Malicious URL detection using machine learning: A survey. arXiv preprint arXiv:1701.07179.

Crockett, K., Latham, A., & Whitton, N. (2017). On predicting learning styles in conversational intelligent tutoring systems using fuzzy decision trees. International Journal of Human-Computer Studies, 97, 98-115.

Sun, B., Chen, S., Wang, J., & Chen, H. (2016). A robust multi-class AdaBoost algorithm for mislabeled noisy data. Knowledge-Based Systems, 102, 87-102.

Baig, M. M., Awais, M. M., & El-Alfy, E. S. M. (2017). AdaBoost-based artificial neural network learning. Neurocomputing, 248, 120-126.

Pan, X., Luo, Y., & Xu, Y. (2015). K-nearest neighbor based structural twin support vector machine. Knowledge-Based Systems, 88, 34-44.

Bahnsen, A. C., Aouada, D., & Ottersten, B. (2015). Example-dependent cost-sensitive decision trees. Expert Systems with Applications, 42(19), 6609-6619.


Refbacks

  • There are currently no refbacks.