Mostrar el registro sencillo del ítem

dc.contributor.authorBarrera Pérez, Carlos Eduardo
dc.contributor.authorSerrano, Jairo E.
dc.contributor.authorMartinez-Santos, Juan Carlos
dc.date.accessioned2023-07-21T16:23:36Z
dc.date.available2023-07-21T16:23:36Z
dc.date.issued2021
dc.date.submitted2023
dc.identifier.citationPérez, C. E. B., Serrano, J. E., & Martinez-Santos, J. C. (2021, December). Cyberattacks Predictions Workflow using Machine Learning. In 2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT) (pp. 1-6). IEEE.spa
dc.identifier.urihttps://hdl.handle.net/20.500.12585/12335
dc.description.abstractThis research aims to validate the effectiveness of a machine learning model composed of three classifiers: decision tree, logistic regression, and support vector machines. Through the design of a workflow, we demonstrate the effectiveness of the model. First, we execute a network attack, and then monitoring, processing, storage, visualization, and data transfer tools are implemented to create the most realistic environment possible and obtain more accurate predictions. © 2021 IEEE.spa
dc.format.extent6 páginas
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.sourceProceedings of the 2021 IEEE International Conference on Machine Learning and Applied Network Technologies, ICMLANT 2021spa
dc.titleCyberattacks Predictions Workflow using Machine Learningspa
dcterms.bibliographicCitationEkanayake, N., Karunarathna, H., Miyuranga, R. (2020) What Is Cybersecurity: The Reality of Modern Threats, 1.spa
dcterms.bibliographicCitationIbor, A., Obidinnu, J. System hardening architecture for safer access to critical business data (2015) Nigerian Journal of Technology, 34 (10), p. 788. Cited 3 times.spa
dcterms.bibliographicCitationTripathi, N., Mehtre, B. (2013) Dos and Ddos Attacks: Impact, Analysis and Countermeasures, 12, pp. 1-6. Cited 17 times.spa
dcterms.bibliographicCitationMijwil, M. (2015) History of Artificial Intelligence, 3, pp. 1-8. Cited 2 times. 04spa
dcterms.bibliographicCitationChoi, R.Y., Coyner, A.S., Kalpathy-Cramer, J., Chiang, M.F., Peter Campbell, J. Introduction to machine learning, neural networks, and deep learning (2020) Translational Vision Science and Technology, 9 (2), art. no. 14. Cited 185 times. http://tvst.arvojournals.org/article.aspx?articleid=2762344 doi: 10.1167/tvst.9.2.14spa
dcterms.bibliographicCitationHerńandez, J., Cajamarca, W. (2020) Modelos de Clasificación de Ataques de Reflexión DDoS Usando Técnicas de Machine Learningspa
dcterms.bibliographicCitationHerńandez, J., Cajamarca, W. (2020) Modelos de Clasificación de Ataques de Reflexión DDoS Usando Técnicas de Machine Learningspa
dcterms.bibliographicCitationÁlvarez Almeida, L., Martinez-Santos, J.C. SIDS-DDoS, a Smart Intrusion Detection System for Distributed Denial of Service Attacks (2020) Advances in Intelligent Systems and Computing, 1067, pp. 380-389. http://www.springer.com/series/11156 ISBN: 978-303032032-4 doi: 10.1007/978-3-030-32033-1_35spa
dcterms.bibliographicCitationBanerjee, U., Vashishtha, A., Saxena, M. Evaluation of the capabilities of wireshark as a tool for intrusion detection (2010) International Journal of Computer Applications, 6 (7), pp. 1-5. Cited 38 times.spa
dcterms.bibliographicCitationBanerjee, U., Vashishtha, A., Saxena, M. Evaluation of the capabilities of wireshark as a tool for intrusion detection (2010) International Journal of Computer Applications, 6 (7), pp. 1-5. Cited 38 times.spa
dcterms.bibliographicCitationBajer, M. Building an IoT data hub with elasticsearch, Logstash and Kibana (2017) Proceedings - 2017 5th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2017, 2017-January, pp. 63-68. Cited 56 times. ISBN: 978-153863281-9 doi: 10.1109/FiCloudW.2017.101spa
dcterms.bibliographicCitationSanjappa, S., Ahmed, M. Analysis of logs by using logstash (2017) Advances in Intelligent Systems and Computing, 516, pp. 579-585. Cited 14 times. http://www.springer.com/series/11156 ISBN: 978-981103155-7 doi: 10.1007/978-981-10-3156-4_61spa
dcterms.bibliographicCitationGormley, C., Tong, Z. (2015) Elasticsearch: The Definitive Guide: A Distributed Real-time Search and Analytics Engine.. Cited 395 times. "O'Reilly Media, Inc."spa
dcterms.bibliographicCitationKúc, R., Rogozinski, M. (2016) ElasticSearch Server. Cited 25 times. Packt Publishing Ltdspa
dcterms.bibliographicCitationAzarmi, B. (2017) Learning Kibana 5.0. Cited 3 times. Packt Publishing Ltdspa
dcterms.bibliographicCitationSharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy (2019) Proceedings - International Carnahan Conference on Security Technology, 2019-October, art. no. 8888419. Cited 359 times. ISBN: 978-172811576-4 doi: 10.1109/CCST.2019.8888419spa
dcterms.bibliographicCitationÁlvarez Almeida, L.A. Data model classification based on machine learning techniques for detection of anomalous traffic (2019) Cartagena de Indiasspa
dcterms.bibliographicCitationAgnihotri, J., Phalnikar, R. Development of performance testing suite using apache JMeter (2018) Advances in Intelligent Systems and Computing, 673, pp. 317-326. Cited 4 times. http://www.springer.com/series/11156 ISBN: 978-981107244-4 doi: 10.1007/978-981-10-7245-1_32spa
datacite.rightshttp://purl.org/coar/access_right/c_abf2spa
oaire.versionhttp://purl.org/coar/version/c_b1a7d7d4d402bccespa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.hasversioninfo:eu-repo/semantics/draftspa
dc.identifier.doi10.1109/ICMLANT53170.2021.9690527
dc.subject.keywordsDenial-Of-Service Attack;spa
dc.subject.keywordsDDoS;spa
dc.subject.keywordsAttackspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.ccAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.identifier.instnameUniversidad Tecnológica de Bolívarspa
dc.identifier.reponameRepositorio Universidad Tecnológica de Bolívarspa
dc.publisher.placeCartagena de Indiasspa
dc.subject.armarcLEMB
dc.type.spahttp://purl.org/coar/resource_type/c_6501spa
oaire.resourcetypehttp://purl.org/coar/resource_type/c_6501spa


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

http://creativecommons.org/licenses/by-nc-nd/4.0/
http://creativecommons.org/licenses/by-nc-nd/4.0/

Universidad Tecnológica de Bolívar - 2017 Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional. Resolución No 961 del 26 de octubre de 1970 a través de la cual la Gobernación de Bolívar otorga la Personería Jurídica a la Universidad Tecnológica de Bolívar.