Algorithm selection framework for cyber attack detection

@article{Chale2020AlgorithmSF,
  title={Algorithm selection framework for cyber attack detection},
  author={Marc Chal'e and Nathaniel D. Bastian and Jeffery D. Weir},
  journal={Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning},
  year={2020}
}
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually. In this work, an algorithm selection framework is employed on the NSL-KDD data set and a novel paradigm of machine learning taxonomy is presented. The framework uses a combination of user input and meta-features to select the best algorithm to detect cyber attacks on a network. Performance is compared between a rule-of-thumb strategy and a… Expand

References

SHOWING 1-10 OF 53 REFERENCES
Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm
TLDR
In this paper idea for use of a Genetic Algorithm (GA) based approach for generation of rules to detect Probing, DoS and R2L attacks on the system is proposed. Expand
Intelligent Feature Engineering for Cybersecurity
TLDR
This research uses network packet dataflows from the Defense Research and Engineering Network (DREN) and the Engineer Research and Development Center’s (ERDC) high performance computing systems to experimentally analyze various methods of feature engineering to provide insight on the suitability of the features for machine learning based cybersecurity applications. Expand
A deep learning method with wrapper based feature extraction for wireless intrusion detection system
TLDR
The results suggested that the proposed Feed-Forward Deep Neural Network (FFDNN) wireless IDS system using a Wrapper Based Feature Extraction Unit (WFEU) has greater detection accuracy than other approaches. Expand
Towards a taxonomy of intrusion-detection systems
TLDR
A taxonomy of intrusion-detection systems is introduced that highlights the various aspects of this area and is illustrated by numerous examples from past and current projects. Expand
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems
TLDR
It is demonstrated that a hardware (HW) implementation of network security algorithms can significantly reduce their energy consumption compared to an equivalent software (SW) version. Expand
A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection
TLDR
This paper focuses on detailed study on NSLKDD dataset that contains only selected record that provide a good analysis on various machine learning techniques for intrusion detection. Expand
A detailed analysis of the KDD CUP 99 data set
TLDR
A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings. Expand
Characterizing the Applicability of Classification Algorithms Using Meta-Level Learning
TLDR
It is shown that machine learning methods themselves can be used in organizing this knowledge and that the method is viable and useful. Expand
A taxonomy of computer program security flaws
TLDR
This survey provides a taxonomy for computer program security flaws, with an Appendix that documents 50 actual security flaws that provide a good introduction to the characteristics of security flaws and how they can arise. Expand
Recommending Learning Algorithms and Their Associated Hyperparameters
TLDR
This work proposes to apply collaborative filtering techniques to learning algorithm and hyperparameter selection, and finds that doing so avoids determining which meta-features to use and outperforms traditional meta-learning approaches in many cases. Expand
...
1
2
3
4
5
...