Intelligent Incident Response Systems Using Machine Learning
Abstract
Keywords
Full Text:
PDFReferences
1. Ahmed, M., Mahmood, A. N., & Hu, J. (2015). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. doi: 10.1016/j.jnca.2015.11.016
2. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection. ACM Computing Surveys, 41(3), 1–58. doi: 10.1145/1541880.1541882
3. Madsen, H., Grov, G., Mancini, F., Baksaas, M., & Sommervoll, Å. Å. (2024). Exploring reinforcement learning for incident response in autonomous military vehicles. arXiv (Cornell University). doi: 10.48550/arxiv.2410.21407
4. Bhardwaj, A., & Kaushik, K. (2022). Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure. International Journal of Cloud Applications and Computing, 12(1), 1–20. doi: 10.4018/ijcac.297106
5. Tolba, A., Mostafa, N. N., & Sallam, K. M. (2024). Hybrid Deep Learning-Based Model for Intrusion Detection. Artificial Intelligence in Cybersecurity, 1, 1–11. doi: 10.61356/j.aics.2024.1198
6. Gupta, A., & Sharma, L. S. (2019). Mitigation of DOS and port scan attacks using Snort. International Journal of Computer Sciences and Engineering, 7(4), 248–258. doi: 10.26438/ijcse/v7i4.248258
7. Zamfiroiu, A., & Sharma, R. C. (2022). Cybersecurity management for incident response. Romanian Cyber Security Journal, 4(1), 69–75. doi: 10.54851/v4i1y202208
8. Fernandes, G., Rodrigues, J. J. P. C., Carvalho, L. F., Al-Muhtadi, J. F., & Proença, M. L. (2018). A comprehensive survey on network anomaly detection. Telecommunication Systems, 70(3), 447–489. doi: 10.1007/s11235-018-0475-8
9. Sommer, R., & Paxson, V. (2010). Outside the closed world: on using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. doi: 10.1109/sp.2010.25
10. Rani, S. S., & Reeja, S. R. (2019). A survey on different approaches for malware detection using machine learning techniques. Lecture notes on data engineering and communications technologies, 389–398. doi: 10.1007/978-3-030-34515-0_42
11. Alanezi, M. (2021). Phishing Detection Methods: A review. Technium Romanian Journal of Applied Sciences and Technology, 3(9), 19–35. doi: 10.47577/technium.v3i9.4973
12. Tin, T. T., Xin, K. J., Aitizaz, A., Tiung, L. K., Keat, T. C., & Sarwar, H. (2023). Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data. International Journal of Advanced Computer Science and Applications, 14(9). doi: 10.14569/ijacsa.2023.0140987
13. Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE Access, 8, 222310–222354. doi: 10.1109/access.2020.3041951
14. Lima, R. F., & Pereira, A. C. M. (2015). A Fraud Detection Model Based on Feature Selection and Undersampling Applied to Web Payment Systems. Conference: 2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT). doi: 10.1109/wi-iat.2015.13
15. Bertino, E., & Islam, N. (2017). Botnets and Internet of Things security. Computer, 50(2), 76–79. doi: 10.1109/mc.2017.62
16. Gunuganti, A. (2023). Behavioural biometrics for continuous authentication. Journal of Biosensors and Bioelectronics Research, 1–5. doi: 10.47363/jbber/2023(1)122
17. Moustafa, N., & Slay, J. (2015). The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. Conference: 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 25–31. doi: 10.1109/badgers.2015.014
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Neibo Augustine Olobo, Waliu Adebayo Ayuba, Abiamamela Obi-Obuoha, Izevbigie Hope Iyobosa, Aderemi Ibraheem Adebayo, Ishiwu Ifeanyichukwu Jude, Chioma Jessica Ifechukwu

This work is licensed under a Creative Commons Attribution 4.0 International License.



