Filters








18,183 Hits in 6.9 sec

Message classification as a basis for studying command and control communications—an evaluation of machine learning approaches

Ola Leifler, Henrik Eriksson
2011 Journal of Intelligent Information Systems  
Message classification as a basis for studying command and control communication: an evaluation of machine learning approaches, 2011, Journal of Intelligent Information Systems. http://dx.Abstract In military  ...  command and control, success relies on being able to perform key functions such as communicating intent.  ...  In the following sections, we describe command and control research and the rationale for investigating machine learning approaches for supporting it in Section 2.  ... 
doi:10.1007/s10844-011-0156-5 fatcat:fb5rei4mv5fcvjl35sxbt3zxly

SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications

Ahmad Karim, Rosli Salleh, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
2016 PLoS ONE  
As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies.  ...  The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps' detection, i. e 99.49% accuracy is achieved.  ...  A machine learning based hybrid detection and classification approach is proposed by [35] . The authors built their software using an open-source framework known as CuckooDroid.  ... 
doi:10.1371/journal.pone.0150077 pmid:26978523 pmcid:PMC4792466 fatcat:f26o4di5tfgstktz2fvdyjblna

An AI-powered Network Threat Detection System

Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu.
2022 IEEE Access  
The mutual dependencies of features and network threats are evaluated. Results of a performance analysis reveal that the proposed AI@NTDS system has an accuracy of 99.20% and an F1-score of 99.80%.  ...  The features contain message-based features for all kinds of Linux operating instructions, host-based features for all types of information in the network connection process, and geography-based features  ...  This study presents 14 features that are used in the real-time classification of attacks using machine learning algorithms. Tomas et al.  ... 
doi:10.1109/access.2022.3175886 fatcat:nz7gkhfawbdrvihaowhrubxmte

A Novel Method for Recognizing Vietnamese Voice Commands on Smartphones with Support Vector Machine and Convolutional Neural Networks

Quang H. Nguyen, Tuan-Dung Cao
2020 Wireless Communications and Mobile Computing  
We propose a supervised machine-learning approach to address cases in which Google incorrectly identifies voice commands.  ...  First, we build a voice command dataset that includes hypotheses of GSR for each corresponding voice command.  ...  SVM is a supervised machine-learning method used for classification and regression problems [16] .  ... 
doi:10.1155/2020/2312908 fatcat:ph244qk5pfgjhakjspzkbsw45a

A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

Slavica V. Bostjancic Rakas, Mirjana D. Stojanovic, Jasna D. Markovic-Petrovic
2020 IEEE Access  
This article aims to contribute to assess the state-ofthe-art, identify the open issues and provide an insight for future study areas.  ...  Results of our analysis indicate considerable progress regarding the development of machine learning-based detection methods, implementation platforms, and to some extent, sophisticated testbeds.  ...  Machine learning-based techniques establish an explicit or implicit model that allows classification of analyzed patterns.  ... 
doi:10.1109/access.2020.2994961 fatcat:pid6aq5t7be7hkf4moaym2wqti

CyberPulse: A Machine Learning based Link Flooding Attack Mitigation System for Software Defined Networks

Raihan Ur Rasool, Usman Ashraf, Khandakar Ahmed, Hua Wang, Wajid Rafique, Zahid Anwar
2019 IEEE Access  
CyberPulse was evaluated for its accuracy, false positive rate, and effectiveness as compared to competing approaches on realistic networks generated using Mininet.  ...  CyberPulse performs network surveillance by classifying network traffic using deep learning techniques and is implemented as an extension module in the Floodlight controller.  ...  Machine Learning (ML) allows machines to learn about the features of a problem using statistical techniques and automate the solution for an arbitrary dataset.  ... 
doi:10.1109/access.2019.2904236 fatcat:m2p3y4ttbngtxffra6vua4nhnq

Peer to Peer Botnet Detection Based on Flow Intervals [chapter]

David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu
2012 IFIP Advances in Information and Communication Technology  
In this paper we propose an approach to detect botnet activity by classifying network traffic behavior using machine learning classification techniques.  ...  We study the feasibility of detecting botnet activity without having seen a complete network flow by classifying behavior based on time intervals and we examine the performance of two popular classification  ...  Evaluation results We implemented our framework in Java and utilized the popular Weka machine learning framework and libraries for our classification algorithms [20] .  ... 
doi:10.1007/978-3-642-30436-1_8 fatcat:puuzvflvcrg7bke67o3wwlw3sa

Automated text-based analysis for decision-making research

Ola Leifler, Henrik Eriksson
2011 Cognition, Technology & Work  
Specifically, we devised and evaluated an analysis tool for C 2 researchers who study simulated decision-making scenarios for command teams.  ...  We present results from a study on constructing and evaluating a support tool for the extraction of patterns in distributed decision making processes, based on design criteria elicited from a study on  ...  We would like to thank the participants at the Swedish Defense Research Agency and VSL Systems AB for participating in this study and generously providing material used for the scenarios in this article  ... 
doi:10.1007/s10111-010-0170-3 fatcat:denltud36nha7nduqgdxj6xopq

Collaborative Framework for Early Detection of RAT-Bots Attacks

Ahmed A. Awad, Samir G. Sayed, Sameh A. Salem
2019 IEEE Access  
Attackers tend to use Remote Access Trojans (RATs) to compromise and control a targeted computer, which makes the RAT detection as an active research field.  ...  This paper introduces a machine learning-based framework for detecting compromised hosts and networks that are infected by the RAT-Bots.  ...  ACKNOWLEDGMENT The authors would like to thank the Malware Analysis and Reverse Engineering team in the EG-CERT for providing helpful ideas and the malicious database used in this research.  ... 
doi:10.1109/access.2019.2919680 fatcat:5lwgpmhmpfcqjd6sshcox4xbje

An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers

Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, Mamoun Alazab
2019 Applied Sciences  
To resolve the issues of P2P botnet identification, we propose an effective multi-layer traffic classification method by applying machine learning classifiers on features of network traffic.  ...  Furthermore, our experimental evaluations show the significance of the proposed method in P2P botnets detection and demonstrate an average accuracy of 98.7%.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app9112375 fatcat:s7rkdoabjzbjnpsqlzdpptnuyq

A Random Traffic Assignment Model for Networks Based on Discrete Dynamic Bayesian Algorithms

Wei Zhou, Gengxin Sun
2022 Discrete Dynamics in Nature and Society  
In this paper, a stochastic traffic assignment model for networks is proposed for the study of discrete dynamic Bayesian algorithms.  ...  In this paper, we study a feasible method and theoretical system for implementing traffic engineering in networks based on Bayesian algorithm theory.  ...  See Figure 8 for a comparison of convergence under different training sets. e traffic matrix reflects the traffic load of the whole network and can provide a decision basis for studies such as network  ... 
doi:10.1155/2022/8998352 fatcat:nzjoighvwnhmveq5fr74krk6ru

Distributed Supervised Sentiment Analysis of Tweets: Integrating Machine Learning and Streaming Analytics for Big Data Challenges in Communication and Audience Research

Carlos Arcila Calderón, Félix Ortega Mohedano, Mateo Álvarez, Miguel Vicente Mariño
2019 EMPIRIA: Revista de Metodología de Ciencias Sociales  
Bringing together machine learning and streaming analytics approaches in a distributed environment might help scholars to obtain valuable data from Twitter in order to immediately classify messages depending  ...  The large-scale analysis of tweets in real-time using supervised sentiment analysis depicts a unique opportunity for communication and audience research.  ...  machine learning. the transition from and the dialogue with conventional Media Studies and Communication research are still pending, as progress in these research approaches is not being leaded by Communication  ... 
doi:10.5944/empiria.42.2019.23254 fatcat:yft66k3fpbdwlblg6uvfhee7qe

Modeling of Multi-Agent Oriented learning System for Impaired Students with JADE

Shiladitya Pujari, Sripati Mukhopadhyay
2012 International Journal of Intelligent Systems and Applications  
The learning system is modeled on the basis of both centralized as well as distributed multi-agent planning.  ...  In this research paper we presented a model of multi-agent system based learning environment for physically impaired students.  ...  As we stated earlier, agents of this learning system work on the basis of both centralized as well as distributed multi-agent planning for communication, cooperation and negotiation between themselves  ... 
doi:10.5815/ijisa.2012.12.07 fatcat:gvbtvxzpnvafpc5mbf7ukhygc4

A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES

Mohammed Jamil Elhalabi, Selvakumar Manickam, Loai Bani Melhim, Mohammed Anbar, Huda Alhalabi
2014 Journal of Computer Science  
In this study we discuss various P2P botnet detection approaches and evaluate their effectiveness. We identify the advantages and shortcomings of each of the discussed techniques.  ...  Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks  ...  This research is supported by National Advanced IPv6 Centre of Excellence (NAV6), Universiti Sains Malaysia (USM).Grant title: "A comprehensive botnet mitigation Ecosystem".Acc.No:1001/PNAV/857001.  ... 
doi:10.3844/jcssp.2014.169.177 fatcat:4quoft4bnrdttosfalen46igmy

Using classifier cascades for scalable e-mail classification

Jay Pujara, Hal Daumé, Lise Getoor
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
Using this method, we learn a relationship between feature costs and label hierarchies, for granular classification and cost budgets, for load-sensitive classification.  ...  In load-sensitive classification, we classify a set of instances within an arbitrary total budget for acquiring features.  ...  Acknowledgments This work was partially supported by NSF Grant # IIS-0746930 and AFRL contract # FA8750-10-C-0191.  ... 
doi:10.1145/2030376.2030383 dblp:conf/ceas/PujaraDG11 fatcat:3whipobtbzge7dcoomsbqyjr4e
« Previous Showing results 1 — 15 out of 18,183 results