4.7 Article

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Journal

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Volume 18, Issue 2, Pages 1153-1176

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2015.2494502

Keywords

Cyber analytics; data mining; machine learning

Funding

  1. Department of Homeland Security Network Security Deployment Division [HSSA01-13-C-2709]

Ask authors/readers for more resources

This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial descriptions of each ML/DM method are provided. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available