Mostrar el registro sencillo del ítem
Cyberattacks Predictions Workflow using Machine Learning
dc.contributor.author | Barrera Pérez, Carlos Eduardo | |
dc.contributor.author | Serrano, Jairo E. | |
dc.contributor.author | Martinez-Santos, Juan Carlos | |
dc.date.accessioned | 2023-07-21T16:23:36Z | |
dc.date.available | 2023-07-21T16:23:36Z | |
dc.date.issued | 2021 | |
dc.date.submitted | 2023 | |
dc.identifier.citation | Pérez, C. E. B., Serrano, J. E., & Martinez-Santos, J. C. (2021, December). Cyberattacks Predictions Workflow using Machine Learning. In 2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT) (pp. 1-6). IEEE. | spa |
dc.identifier.uri | https://hdl.handle.net/20.500.12585/12335 | |
dc.description.abstract | This research aims to validate the effectiveness of a machine learning model composed of three classifiers: decision tree, logistic regression, and support vector machines. Through the design of a workflow, we demonstrate the effectiveness of the model. First, we execute a network attack, and then monitoring, processing, storage, visualization, and data transfer tools are implemented to create the most realistic environment possible and obtain more accurate predictions. © 2021 IEEE. | spa |
dc.format.extent | 6 páginas | |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | eng | spa |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.source | Proceedings of the 2021 IEEE International Conference on Machine Learning and Applied Network Technologies, ICMLANT 2021 | spa |
dc.title | Cyberattacks Predictions Workflow using Machine Learning | spa |
dcterms.bibliographicCitation | Ekanayake, N., Karunarathna, H., Miyuranga, R. (2020) What Is Cybersecurity: The Reality of Modern Threats, 1. | spa |
dcterms.bibliographicCitation | Ibor, A., Obidinnu, J. System hardening architecture for safer access to critical business data (2015) Nigerian Journal of Technology, 34 (10), p. 788. Cited 3 times. | spa |
dcterms.bibliographicCitation | Tripathi, N., Mehtre, B. (2013) Dos and Ddos Attacks: Impact, Analysis and Countermeasures, 12, pp. 1-6. Cited 17 times. | spa |
dcterms.bibliographicCitation | Mijwil, M. (2015) History of Artificial Intelligence, 3, pp. 1-8. Cited 2 times. 04 | spa |
dcterms.bibliographicCitation | Choi, R.Y., Coyner, A.S., Kalpathy-Cramer, J., Chiang, M.F., Peter Campbell, J. Introduction to machine learning, neural networks, and deep learning (2020) Translational Vision Science and Technology, 9 (2), art. no. 14. Cited 185 times. http://tvst.arvojournals.org/article.aspx?articleid=2762344 doi: 10.1167/tvst.9.2.14 | spa |
dcterms.bibliographicCitation | Herńandez, J., Cajamarca, W. (2020) Modelos de Clasificación de Ataques de Reflexión DDoS Usando Técnicas de Machine Learning | spa |
dcterms.bibliographicCitation | Herńandez, J., Cajamarca, W. (2020) Modelos de Clasificación de Ataques de Reflexión DDoS Usando Técnicas de Machine Learning | spa |
dcterms.bibliographicCitation | Álvarez Almeida, L., Martinez-Santos, J.C. SIDS-DDoS, a Smart Intrusion Detection System for Distributed Denial of Service Attacks (2020) Advances in Intelligent Systems and Computing, 1067, pp. 380-389. http://www.springer.com/series/11156 ISBN: 978-303032032-4 doi: 10.1007/978-3-030-32033-1_35 | spa |
dcterms.bibliographicCitation | Banerjee, U., Vashishtha, A., Saxena, M. Evaluation of the capabilities of wireshark as a tool for intrusion detection (2010) International Journal of Computer Applications, 6 (7), pp. 1-5. Cited 38 times. | spa |
dcterms.bibliographicCitation | Banerjee, U., Vashishtha, A., Saxena, M. Evaluation of the capabilities of wireshark as a tool for intrusion detection (2010) International Journal of Computer Applications, 6 (7), pp. 1-5. Cited 38 times. | spa |
dcterms.bibliographicCitation | Bajer, M. Building an IoT data hub with elasticsearch, Logstash and Kibana (2017) Proceedings - 2017 5th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2017, 2017-January, pp. 63-68. Cited 56 times. ISBN: 978-153863281-9 doi: 10.1109/FiCloudW.2017.101 | spa |
dcterms.bibliographicCitation | Sanjappa, S., Ahmed, M. Analysis of logs by using logstash (2017) Advances in Intelligent Systems and Computing, 516, pp. 579-585. Cited 14 times. http://www.springer.com/series/11156 ISBN: 978-981103155-7 doi: 10.1007/978-981-10-3156-4_61 | spa |
dcterms.bibliographicCitation | Gormley, C., Tong, Z. (2015) Elasticsearch: The Definitive Guide: A Distributed Real-time Search and Analytics Engine.. Cited 395 times. "O'Reilly Media, Inc." | spa |
dcterms.bibliographicCitation | Kúc, R., Rogozinski, M. (2016) ElasticSearch Server. Cited 25 times. Packt Publishing Ltd | spa |
dcterms.bibliographicCitation | Azarmi, B. (2017) Learning Kibana 5.0. Cited 3 times. Packt Publishing Ltd | spa |
dcterms.bibliographicCitation | Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy (2019) Proceedings - International Carnahan Conference on Security Technology, 2019-October, art. no. 8888419. Cited 359 times. ISBN: 978-172811576-4 doi: 10.1109/CCST.2019.8888419 | spa |
dcterms.bibliographicCitation | Álvarez Almeida, L.A. Data model classification based on machine learning techniques for detection of anomalous traffic (2019) Cartagena de Indias | spa |
dcterms.bibliographicCitation | Agnihotri, J., Phalnikar, R. Development of performance testing suite using apache JMeter (2018) Advances in Intelligent Systems and Computing, 673, pp. 317-326. Cited 4 times. http://www.springer.com/series/11156 ISBN: 978-981107244-4 doi: 10.1007/978-981-10-7245-1_32 | spa |
datacite.rights | http://purl.org/coar/access_right/c_abf2 | spa |
oaire.version | http://purl.org/coar/version/c_b1a7d7d4d402bcce | spa |
dc.type.driver | info:eu-repo/semantics/article | spa |
dc.type.hasversion | info:eu-repo/semantics/draft | spa |
dc.identifier.doi | 10.1109/ICMLANT53170.2021.9690527 | |
dc.subject.keywords | Denial-Of-Service Attack; | spa |
dc.subject.keywords | DDoS; | spa |
dc.subject.keywords | Attack | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.identifier.instname | Universidad Tecnológica de Bolívar | spa |
dc.identifier.reponame | Repositorio Universidad Tecnológica de Bolívar | spa |
dc.publisher.place | Cartagena de Indias | spa |
dc.subject.armarc | LEMB | |
dc.type.spa | http://purl.org/coar/resource_type/c_6501 | spa |
oaire.resourcetype | http://purl.org/coar/resource_type/c_6501 | spa |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Productos de investigación [1453]
Universidad Tecnológica de Bolívar - 2017 Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional. Resolución No 961 del 26 de octubre de 1970 a través de la cual la Gobernación de Bolívar otorga la Personería Jurídica a la Universidad Tecnológica de Bolívar.