Bayesian Models Applied to Cyber Security Anomaly Detection Problems

03/23/2020
by   José A. Perusquía, et al.
0

Nowadays cyber security is an important concern for all individuals, organisations and governments globally. Cyber attacks have become more sophisticated, frequent and more dangerous than ever, and traditional anomaly detection methods have been proven to be less effective when dealing with these new classes of cyber attacks. In order to address this, both classical and Bayesian statistical models offer a valid and innovative alternative to the traditional signature-based methods, motivating the increasing interest in statistical research that it has been observed in recent years. In this review paper we provide a description of some typical cyber security challenges and the kind of data involved, paying special attention to Bayesian approaches for these problems

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/04/2023

Anomaly Detection Techniques in Smart Grid Systems: A Review

Smart grid data can be evaluated for anomaly detection in numerous field...
research
08/15/2018

Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

As the amount of cyber data continues to grow, cyber network defenders a...
research
05/24/2019

Cyber Warfare: Terms, Issues, Laws and Controversies

Recent years have shown us the importance of cybersecurity. Especially, ...
research
08/30/2021

Thermal Management in Large Data Centers: Security Threats and Mitigation

Data centres are experiencing significant growth in their scale, especia...
research
04/23/2021

Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle

Using Infrastructure-to-Vehicle (I2V) information can be of great benefi...
research
08/18/2020

Dragon Crypto – An Innovative Cryptosystem

In recent years cyber-attacks are continuously developing. This means th...
research
06/07/2023

IsoEx: an explainable unsupervised approach to process event logs cyber investigation

39 seconds. That is the timelapse between two consecutive cyber attacks ...

Please sign up or login with your details

Forgot password? Click here to reset