Search Results - "Mink, Dustin"
-
1
Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks
Published in Future internet (01-04-2023)“…This study, focusing on identifying rare attacks in imbalanced network intrusion datasets, explored the effect of using different ratios of oversampled to…”
Get full text
Journal Article -
2
Extended Isolation Forest for Intrusion Detection in Zeek Data
Published in Information (Basel) (01-07-2024)“…The novelty of this paper is in determining and using hyperparameters to improve the Extended Isolation Forest (EIF) algorithm, a relatively new algorithm, to…”
Get full text
Journal Article -
3
Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data
Published in Computers (Basel) (01-10-2023)“…Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such…”
Get full text
Journal Article -
4
Resampling to Classify Rare Attack Tactics in UWF-ZeekData22
Published in Knowledge (14-03-2024)“…One of the major problems in classifying network attack tactics is the imbalanced nature of data. Typical network datasets have an extremely high percentage of…”
Get full text
Journal Article -
5
Node Classification of Network Threats Leveraging Graph-Based Characterizations Using Memgraph
Published in Computers (Basel) (01-07-2024)“…This research leverages Memgraph, an open-source graph database, to analyze graph-based network data and apply Graph Neural Networks (GNNs) for a detailed…”
Get full text
Journal Article -
6
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Published in Big data and cognitive computing (01-06-2021)“…Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual…”
Get full text
Journal Article -
7
Data mining techniques to study voting patterns in the US
Published in Data science journal (01-01-2007)“…This paper presents data mining techniques that can be used to study voting patterns in the United States House of Representatives and shows how the results…”
Get full text
Journal Article -
8
Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework
Published in Sensors (Basel, Switzerland) (20-10-2022)“…While computer networks and the massive amount of communication taking place on these networks grow, the amount of damage that can be done by network…”
Get full text
Journal Article -
9
Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT CK Framework from UWF-ZeekData22
Published in Future internet (01-07-2023)“…There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of…”
Get full text
Journal Article -
10
Detecting Reconnaissance and Discovery Tactics from the MITRE ATT CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework
Published in Sensors (Basel, Switzerland) (01-10-2022)“…While computer networks and the massive amount of communication taking place on these networks grow, the amount of damage that can be done by network…”
Get full text
Journal Article -
11
Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22
Published in Future internet (01-07-2023)“…There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of…”
Get full text
Journal Article -
12
Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework
Published in Data (Basel) (01-01-2023)“…With the rapid rate at which networking technologies are changing, there is a need to regularly update network activity datasets to accurately reflect the…”
Get full text
Journal Article -
13
Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT CK Framework
Published in Data (Basel) (01-01-2023)“…With the rapid rate at which networking technologies are changing, there is a need to regularly update network activity datasets to accurately reflect the…”
Get full text
Journal Article -
14
Indicators of Compromise for the United States Federal Aviation Administration Next Generation Air Transportation System Automatic Dependent Surveillance-Broadcast
Published 01-01-2019“…Modern day aircraft are flying computer networks and are vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance,…”
Get full text
Dissertation