Key points are not available for this paper at this time.
This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial descriptions of each ML/DM method are provided. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided.
Building similarity graph...
Analyzing shared references across papers
Loading...
Buczak et al. (Mon,) studied this question.
www.synapsesocial.com/papers/69d73fc8c74376700bf31130 — DOI: https://doi.org/10.1109/comst.2015.2494502
Anna L. Buczak
Erhan Guven
IEEE Communications Surveys & Tutorials
Johns Hopkins University Applied Physics Laboratory
Building similarity graph...
Analyzing shared references across papers
Loading...