Cyber anomaly detection: Using tabulated vectors and embedded analytics for efficient data mining

Volume: 12, Issue: 4, Pages: 293 - 310
Published: Aug 6, 2018
Abstract
Firewalls, especially at large organizations, process high velocity internet traffic and flag suspicious events and activities. Flagged events can be benign, such as misconfigured routers, or malignant, such as a hacker trying to gain access to a specific computer. Confounding this is that flagged events are not always obvious in their danger and the high velocity nature of the problem. Current work in firewall log analysis is manual intensive...
Paper Details
Title
Cyber anomaly detection: Using tabulated vectors and embedded analytics for efficient data mining
Published Date
Aug 6, 2018
Volume
12
Issue
4
Pages
293 - 310
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.