دانلود مقاله انگلیسی رایگان:بررسی جامع تشخیص حملات سایبری: مجموعه داده‌ها، روش‌ها، چالش‌ ها و جهت‌گیری‌های تحقیقاتی آینده - 2022
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2
دانلود مقاله انگلیسی اینترنت اشیاء رایگان
  • A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
    A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

    دسته بندی:

    اینترنت اشیاء - Internet of Things


    سال انتشار:

    2022


    عنوان انگلیسی مقاله:

    A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions


    ترجمه فارسی عنوان مقاله:

    بررسی جامع تشخیص حملات سایبری: مجموعه داده‌ها، روش‌ها، چالش‌ ها و جهت‌گیری‌های تحقیقاتی آینده


    منبع:

    ScienceDirect- Elsevier- Internet of Things, Corrected proof, 100615: doi:10:1016/j:iot:2022:100615


    نویسنده:

    None


    چکیده انگلیسی:

    Rapid developments in network technologies and the amount and scope of data transferred on networks are increasing day by day. Depending on this situation, the density and complexity of cyber threats and attacks are also expanding. The ever-increasing network density makes it difficult for cybersecurity professionals to monitor every movement on the network. More frequent and complex cyberattacks make the detection and identification of anomalies in network events more complex. Machine learning offers various tools and techniques for automating the detection of cyber attacks and for rapid prediction and analysis of attack types. This study discusses the approaches to machine learning methods used to detect attacks. We examined the detection, classification, clustering, and analysis of anomalies in network traffic. We gave the cyber-security focus, machine learning methods, and data sets used in each study we examined. We investigated which feature selection or dimension reduction method was applied to the data sets used in the studies. We presented in detail the types of classification carried out in these studies, which methods were compared with other methods, the performance metrics used, and the results obtained in tables. We examined the data sets of network attacks presented as open access. We suggested a basic taxonomy for cyber attacks. Finally, we discussed the difficulties encountered in machine learning applications used in network attacks and their solutions
    Keywords: Cyber attacks | Machine learning | Deep learning | Geometric deep learning | Cyber security | Adversarial machine learning | Intrusion detection


    سطح: متوسط
    تعداد صفحات فایل pdf انگلیسی: 27
    حجم فایل: 1544 کیلوبایت

    قیمت: رایگان


    توضیحات اضافی:




اگر این مقاله را پسندیدید آن را در شبکه های اجتماعی به اشتراک بگذارید (برای به اشتراک گذاری بر روی ایکن های زیر کلیک کنید)

تعداد نظرات : 0

الزامی
الزامی
الزامی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4457 :::::::: بازدید دیروز: 10523 :::::::: بازدید کل: 14980 :::::::: افراد آنلاین: 4