Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Nakilp, Mert"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 4
    Citation - Scopus: 10
    G-Networks Can Detect Different Types of Cyberattacks
    (IEEE COMPUTER SOC, 2022) Erol Gelenbe; Mert Nakilp; Nakilp, Mert; Nakip, Mert; Gelenbe, Erol
    Malicious network attacks are a serious source of concern and machine learning techniques are widely used to build Attack Detectors with off-line training with real attack and non-attack data and used online to monitor system entry points connected to networks. Many machine learning based Attack Detectors are typically trained to identify specific types attacks and the training of such algorithms to cover several types of attacks may be excessively time consuming. This paper shows that G-Networks which are queueing networks with product form solution and special customers such as negative customers and triggers can be trained just with non-attack traffic can accurately detect several different attack types. This is established with a special case of G-Networks with triggerred customer movement. A DARPA attack and non-attack traffic repository is used to train and test the the G-Network yielding comparable or clearly better accuracy than most known attack detection techniques.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback