谷歌浏览器插件
订阅小程序
在清言上使用

Suspicious Network Event Recognition Leveraging on Machine Learning.

2019 IEEE International Conference on Big Data (Big Data)(2019)

引用 0|浏览52
暂无评分
摘要
Network log events produced by network probes are used by security analyzers to detect traffic anomalies and threats. While it is relatively trivial for a probe to mark specific events as suspicious, it is much more challenging for log analyzers to create a comprehensive picture of the overall network. Machine learning can potentially help in this, however there is no specific solution for analyzing network event logs. This paper covers the experiments and design choices that have been made to create a machine learning-based tool able to analyze network event logs. The tool has been evaluated in the Suspicious Network Event Recognition Cup at IEEE BigData 2019, achieving an AUC (Area Under the Curve) of over 90%, making it accurate enough for deployment in real life scenarios.
更多
查看译文
关键词
machine learning,gradient boosting,network events,cyber-security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要