A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
dc.authorid | 0000-0002-4320-0198 | |
dc.contributor.author | Ahmetoglu, Huseyin | |
dc.contributor.author | Das, Resul | |
dc.date.accessioned | 2023-01-11T10:28:46Z | |
dc.date.available | 2023-01-11T10:28:46Z | |
dc.date.issued | 2022 | |
dc.department | MAÜ, Meslek Yüksekokulları, Mardin Meslek Yüksekokulu, Bilgisayar Teknolojileri Bölümü | en_US |
dc.description.abstract | Rapid developments in network technologies and the amount and scope of data transferred on networks are increasing day by day. Depending on this situation, the density and complexity of cyber threats and attacks are also expanding. The ever-increasing network density makes it difficult for cyber-security professionals to monitor every movement on the network. More frequent and complex cyber-attacks make the detection and identification of anomalies in network events more complex. Machine learning offers various tools and techniques for automating the detection of cyber attacks and for rapid prediction and analysis of attack types. This study discusses the approaches to machine learning methods used to detect attacks. We examined the detection, classification, clustering, and analysis of anomalies in network traffic. We gave the cyber-security focus, machine learning methods, and data sets used in each study we examined. We investigated which feature selection or dimension reduction method was applied to the data sets used in the studies. We presented in detail the types of classification carried out in these studies, which methods were compared with other methods, the performance metrics used, and the results obtained in tables. We examined the data sets of network attacks presented as open access. We suggested a basic taxonomy for cyber attacks. Finally, we discussed the difficulties encountered in machine learning applications used in network attacks and their solutions. | en_US |
dc.description.citation | Ahmetoglu, H., & Das, R. (2022). A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions. Internet of Things, 100615. | en_US |
dc.description.provenance | Submitted by abdulsamet akan (abdulsametakan@artuklu.edu.tr) on 2023-01-11T10:27:38Z No. of bitstreams: 1 1-s2.0-S254266052200097X-main.pdf: 3218297 bytes, checksum: d02094009e59e49b34033796446b951d (MD5) | en |
dc.description.provenance | Approved for entry into archive by abdulsamet akan (abdulsametakan@artuklu.edu.tr) on 2023-01-11T10:28:46Z (GMT) No. of bitstreams: 1 1-s2.0-S254266052200097X-main.pdf: 3218297 bytes, checksum: d02094009e59e49b34033796446b951d (MD5) | en |
dc.description.provenance | Made available in DSpace on 2023-01-11T10:28:46Z (GMT). No. of bitstreams: 1 1-s2.0-S254266052200097X-main.pdf: 3218297 bytes, checksum: d02094009e59e49b34033796446b951d (MD5) Previous issue date: 2022 | en |
dc.identifier.doi | 10.1016/j.iot.2022.100615 | |
dc.identifier.scopus | 2-s2.0-85138813809 | |
dc.identifier.uri | https://doi.org/10.1016/j.iot.2022.100615 | |
dc.identifier.uri | https://www.scopus.com/record/display.uri?eid=2-s2.0-85138813809&origin=SingleRecordEmailAlert&dgcid=raven_sc_affil_en_us_email&txGid=1bd57dd855bfa7c457c84585134e1d4c | |
dc.identifier.uri | https://hdl.handle.net/20.500.12514/3308 | |
dc.identifier.volume | 20 | en_US |
dc.identifier.wos | WOS:000867353200001 | |
dc.identifier.wosquality | Q1 | |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | ScienceDirect | en_US |
dc.relation.ispartof | Internet of Things | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Adversarial machine learning; Cyber attacks; Cyber security; Deep learning; Geometric deep learning; Intrusion detection; Machine learning | en_US |
dc.title | A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 1-s2.0-S254266052200097X-main.pdf
- Size:
- 3.07 MB
- Format:
- Adobe Portable Document Format
- Description:
- Full Text - Article
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.44 KB
- Format:
- Item-specific license agreed upon to submission
- Description: