Publicación: Cyberattacks Predictions Workflow using Machine Learning
| datacite.rights | http://purl.org/coar/access_right/c_abf2 | spa |
| dc.contributor.author | Barrera Pérez, Carlos Eduardo | |
| dc.contributor.author | Martínez Santos, Juan Carlos | |
| dc.contributor.author | Serrano Castañeda, Jairo Enrique | |
| dc.date.accessioned | 2023-07-21T16:23:36Z | |
| dc.date.available | 2023-07-21T16:23:36Z | |
| dc.date.issued | 2021 | |
| dc.date.submitted | 2023 | |
| dc.description.abstract | This research aims to validate the effectiveness of a machine learning model composed of three classifiers: decision tree, logistic regression, and support vector machines. Through the design of a workflow, we demonstrate the effectiveness of the model. First, we execute a network attack, and then monitoring, processing, storage, visualization, and data transfer tools are implemented to create the most realistic environment possible and obtain more accurate predictions. © 2021 IEEE. | spa |
| dc.format.extent | 6 páginas | |
| dc.format.mimetype | application/pdf | spa |
| dc.identifier.citation | Pérez, C. E. B., Serrano, J. E., & Martinez-Santos, J. C. (2021, December). Cyberattacks Predictions Workflow using Machine Learning. In 2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT) (pp. 1-6). IEEE. | spa |
| dc.identifier.doi | 10.1109/ICMLANT53170.2021.9690527 | |
| dc.identifier.instname | Universidad Tecnológica de Bolívar | spa |
| dc.identifier.reponame | Repositorio Universidad Tecnológica de Bolívar | spa |
| dc.identifier.uri | https://hdl.handle.net/20.500.12585/12335 | |
| dc.language.iso | eng | spa |
| dc.publisher.place | Cartagena de Indias | spa |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.source | Proceedings of the 2021 IEEE International Conference on Machine Learning and Applied Network Technologies, ICMLANT 2021 | spa |
| dc.subject.armarc | LEMB | |
| dc.subject.keywords | Denial-Of-Service Attack; | spa |
| dc.subject.keywords | DDoS; | spa |
| dc.subject.keywords | Attack | spa |
| dc.title | Cyberattacks Predictions Workflow using Machine Learning | spa |
| dc.type | Artículo de revista | spa |
| dc.type.coar | http://purl.org/coar/resource_type/c_6501 | spa |
| dc.type.driver | info:eu-repo/semantics/article | spa |
| dc.type.hasversion | info:eu-repo/semantics/draft | spa |
| dcterms.bibliographicCitation | Ekanayake, N., Karunarathna, H., Miyuranga, R. (2020) What Is Cybersecurity: The Reality of Modern Threats, 1. | spa |
| dcterms.bibliographicCitation | Ibor, A., Obidinnu, J. System hardening architecture for safer access to critical business data (2015) Nigerian Journal of Technology, 34 (10), p. 788. Cited 3 times. | spa |
| dcterms.bibliographicCitation | Tripathi, N., Mehtre, B. (2013) Dos and Ddos Attacks: Impact, Analysis and Countermeasures, 12, pp. 1-6. Cited 17 times. | spa |
| dcterms.bibliographicCitation | Mijwil, M. (2015) History of Artificial Intelligence, 3, pp. 1-8. Cited 2 times. 04 | spa |
| dcterms.bibliographicCitation | Choi, R.Y., Coyner, A.S., Kalpathy-Cramer, J., Chiang, M.F., Peter Campbell, J. Introduction to machine learning, neural networks, and deep learning (2020) Translational Vision Science and Technology, 9 (2), art. no. 14. Cited 185 times. http://tvst.arvojournals.org/article.aspx?articleid=2762344 doi: 10.1167/tvst.9.2.14 | spa |
| dcterms.bibliographicCitation | Herńandez, J., Cajamarca, W. (2020) Modelos de Clasificación de Ataques de Reflexión DDoS Usando Técnicas de Machine Learning | spa |
| dcterms.bibliographicCitation | Herńandez, J., Cajamarca, W. (2020) Modelos de Clasificación de Ataques de Reflexión DDoS Usando Técnicas de Machine Learning | spa |
| dcterms.bibliographicCitation | Álvarez Almeida, L., Martinez-Santos, J.C. SIDS-DDoS, a Smart Intrusion Detection System for Distributed Denial of Service Attacks (2020) Advances in Intelligent Systems and Computing, 1067, pp. 380-389. http://www.springer.com/series/11156 ISBN: 978-303032032-4 doi: 10.1007/978-3-030-32033-1_35 | spa |
| dcterms.bibliographicCitation | Banerjee, U., Vashishtha, A., Saxena, M. Evaluation of the capabilities of wireshark as a tool for intrusion detection (2010) International Journal of Computer Applications, 6 (7), pp. 1-5. Cited 38 times. | spa |
| dcterms.bibliographicCitation | Banerjee, U., Vashishtha, A., Saxena, M. Evaluation of the capabilities of wireshark as a tool for intrusion detection (2010) International Journal of Computer Applications, 6 (7), pp. 1-5. Cited 38 times. | spa |
| dcterms.bibliographicCitation | Bajer, M. Building an IoT data hub with elasticsearch, Logstash and Kibana (2017) Proceedings - 2017 5th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2017, 2017-January, pp. 63-68. Cited 56 times. ISBN: 978-153863281-9 doi: 10.1109/FiCloudW.2017.101 | spa |
| dcterms.bibliographicCitation | Sanjappa, S., Ahmed, M. Analysis of logs by using logstash (2017) Advances in Intelligent Systems and Computing, 516, pp. 579-585. Cited 14 times. http://www.springer.com/series/11156 ISBN: 978-981103155-7 doi: 10.1007/978-981-10-3156-4_61 | spa |
| dcterms.bibliographicCitation | Gormley, C., Tong, Z. (2015) Elasticsearch: The Definitive Guide: A Distributed Real-time Search and Analytics Engine.. Cited 395 times. "O'Reilly Media, Inc." | spa |
| dcterms.bibliographicCitation | Kúc, R., Rogozinski, M. (2016) ElasticSearch Server. Cited 25 times. Packt Publishing Ltd | spa |
| dcterms.bibliographicCitation | Azarmi, B. (2017) Learning Kibana 5.0. Cited 3 times. Packt Publishing Ltd | spa |
| dcterms.bibliographicCitation | Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy (2019) Proceedings - International Carnahan Conference on Security Technology, 2019-October, art. no. 8888419. Cited 359 times. ISBN: 978-172811576-4 doi: 10.1109/CCST.2019.8888419 | spa |
| dcterms.bibliographicCitation | Álvarez Almeida, L.A. Data model classification based on machine learning techniques for detection of anomalous traffic (2019) Cartagena de Indias | spa |
| dcterms.bibliographicCitation | Agnihotri, J., Phalnikar, R. Development of performance testing suite using apache JMeter (2018) Advances in Intelligent Systems and Computing, 673, pp. 317-326. Cited 4 times. http://www.springer.com/series/11156 ISBN: 978-981107244-4 doi: 10.1007/978-981-10-7245-1_32 | spa |
| dspace.entity.type | Publication | |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_6501 | spa |
| oaire.version | http://purl.org/coar/version/c_b1a7d7d4d402bcce | spa |
| relation.isAuthorOfPublication | 35de2f55-a620-47ac-97f2-9961adeac601 | |
| relation.isAuthorOfPublication | db6967a8-73d5-4623-92c5-5e62d5ad495c | |
| relation.isAuthorOfPublication.latestForDiscovery | 35de2f55-a620-47ac-97f2-9961adeac601 |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- Cyberattacks Predictions Workflow using Machine Learning _ IEEE Conference Publication _ IEEE Xplore.pdf
- Tamaño:
- 146.14 KB
- Formato:
- Adobe Portable Document Format
- Descripción:
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 3.11 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: