MAÜ GCRIS Standart veritabanının içerik oluşturulması ve kurulumu Research Ecosystems (https://www.researchecosystems.com) tarafından devam etmektedir. Bu süreçte gördüğünüz verilerde eksikler olabilir.
 

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

dc.authorid 0000-0002-4320-0198
dc.contributor.author Ahmetoğlu, Hüseyin
dc.contributor.author Das, Resul
dc.date.accessioned 2023-01-11T10:28:46Z
dc.date.available 2023-01-11T10:28:46Z
dc.date.issued 2022
dc.department MAÜ, Meslek Yüksekokulları, Mardin Meslek Yüksekokulu, Bilgisayar Teknolojileri Bölümü en_US
dc.description.abstract Rapid developments in network technologies and the amount and scope of data transferred on networks are increasing day by day. Depending on this situation, the density and complexity of cyber threats and attacks are also expanding. The ever-increasing network density makes it difficult for cyber-security professionals to monitor every movement on the network. More frequent and complex cyber-attacks make the detection and identification of anomalies in network events more complex. Machine learning offers various tools and techniques for automating the detection of cyber attacks and for rapid prediction and analysis of attack types. This study discusses the approaches to machine learning methods used to detect attacks. We examined the detection, classification, clustering, and analysis of anomalies in network traffic. We gave the cyber-security focus, machine learning methods, and data sets used in each study we examined. We investigated which feature selection or dimension reduction method was applied to the data sets used in the studies. We presented in detail the types of classification carried out in these studies, which methods were compared with other methods, the performance metrics used, and the results obtained in tables. We examined the data sets of network attacks presented as open access. We suggested a basic taxonomy for cyber attacks. Finally, we discussed the difficulties encountered in machine learning applications used in network attacks and their solutions. en_US
dc.description.citation Ahmetoglu, H., & Das, R. (2022). A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions. Internet of Things, 100615. en_US
dc.identifier.doi 10.1016/j.iot.2022.100615
dc.identifier.scopus 2-s2.0-85138813809
dc.identifier.uri https://doi.org/10.1016/j.iot.2022.100615
dc.identifier.uri https://www.scopus.com/record/display.uri?eid=2-s2.0-85138813809&origin=SingleRecordEmailAlert&dgcid=raven_sc_affil_en_us_email&txGid=1bd57dd855bfa7c457c84585134e1d4c
dc.identifier.uri https://hdl.handle.net/20.500.12514/3308
dc.identifier.volume 20 en_US
dc.identifier.wos WOS:000867353200001
dc.identifier.wosquality Q1
dc.indekslendigikaynak Web of Science en_US
dc.indekslendigikaynak Scopus en_US
dc.language.iso en en_US
dc.publisher ScienceDirect en_US
dc.relation.ispartof Internet of Things en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 75
dc.subject Adversarial machine learning; Cyber attacks; Cyber security; Deep learning; Geometric deep learning; Intrusion detection; Machine learning en_US
dc.title A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions en_US
dc.type Article en_US
dc.wos.citedbyCount 42
dspace.entity.type Publication
relation.isAuthorOfPublication c32fb0d5-bfd6-4e6e-92c6-1978593bce3b
relation.isAuthorOfPublication.latestForDiscovery c32fb0d5-bfd6-4e6e-92c6-1978593bce3b

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
1-s2.0-S254266052200097X-main.pdf
Size:
3.07 MB
Format:
Adobe Portable Document Format
Description:
Full Text - Article

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.44 KB
Format:
Item-specific license agreed upon to submission
Description: