Browsing by Author "Das, Resul"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Article A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions(ScienceDirect, 2022) Ahmetoglu, Huseyin; Das, ResulRapid developments in network technologies and the amount and scope of data transferred on networks are increasing day by day. Depending on this situation, the density and complexity of cyber threats and attacks are also expanding. The ever-increasing network density makes it difficult for cyber-security professionals to monitor every movement on the network. More frequent and complex cyber-attacks make the detection and identification of anomalies in network events more complex. Machine learning offers various tools and techniques for automating the detection of cyber attacks and for rapid prediction and analysis of attack types. This study discusses the approaches to machine learning methods used to detect attacks. We examined the detection, classification, clustering, and analysis of anomalies in network traffic. We gave the cyber-security focus, machine learning methods, and data sets used in each study we examined. We investigated which feature selection or dimension reduction method was applied to the data sets used in the studies. We presented in detail the types of classification carried out in these studies, which methods were compared with other methods, the performance metrics used, and the results obtained in tables. We examined the data sets of network attacks presented as open access. We suggested a basic taxonomy for cyber attacks. Finally, we discussed the difficulties encountered in machine learning applications used in network attacks and their solutions.Conference Object With Deep Learning From Knowledges \ Sweat People Classification of Attack Ties(Ieee, 2019) Ahmetoglu, Huseyin; Das, ResulOne of the solutions proposed to ensure information security is intrusion detection systems. Improving the performance of these systems has been among the most important objectives of information technologies. In this study, a detailed analysis of the explicitly presented CICIDS2017 data set was performed. The data set was rearranged by collecting different types of attacks under the same heading for binary classification. For multiple classifications, all files it contains are combined. Using the new version of the data set, a sample model has been developed with the Full Linked Artificial Neural Network, which is one of the machine learning techniques. This model is encoded with TensorFlow-Keras libraries and classified using network traffic properties. The success of the dual classification results and the multiple classification successes were compared. Multiple classification can include the type of attack. On the other hand, in case of dual classification, the attack is present and no attack status is examined. The success rate of binary classification is expected to reduce false alarm conditions in intrusion detection systems.