cyber security network

A framework for fast and efficient cyber security network intrusion detection using apache spark
free download

Due to increase in internet based services, the size of network traffic data has become so large and complex that it is very difficult to process with the traditional data processing tools. Fast and efficient cyber security intrusion detection is a very challenging problem due to big

Network intrusion detection and visualization using aggregations in a cyber security data warehouse
free download

We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data. Keywords: Cyber Security ; Network Intrusion; Anomaly Detection; Data Warehouses; Aggregation; Personalization; Situational Understanding

Results and lessons learned from a user study of display effectiveness with experienced cyber security network analysts
free download

Background. Visualization tools have been developed for various network analysis tasks for Computer Network Defense (CND) analysts, yet there are few empirical studies in the domain of cyber security that validate the efficacy of various graphical constructions with

Data Science in Cyber Security : Network Security Threat Detection
free download

In this new era of digitalization, cyber-attacks are controlled by creative, intelligent and highly skilled humans. Ongoing synchronization allows an attacker to gradually learn more about the target network, adapt to any defensive measures, and advance the attack over

Cyber Security Network Anomaly Detection and Visualization
free download

ABSTRACT In this Major Qualifying Project, we present a novel anomaly detection system for computer networks and a visualization system to help users explore network captures. The detection algorithm uses Robust Principal Component Analysis to produce a lower

free download

This research was developed with funding from the Defense Advanced Research Agency (DARPA). Disclaimer: The views, opinions and/or findings expressed are those of the authors and should not be interpreted as representing the official views or policies of the

COMMENT computer science


cyber security network IEEE PAPER