Back to Search
Start Over
Machine Automation Making Cyber-Policy Violator More Resilient
- Publication Year :
- 2021
- Publisher :
- IGI Global, 2021.
-
Abstract
- Cybersecurity is of global importance. Nearly all association suffer from an active cyber-attack. However, there is a lack of making cyber policy violator more resilient for analysts in proportionately analyzing security incidents. Now the question: Is there any proper technique of implementations for assisting automated decision to the analyst using a comparison study feature selection method? The authors take multi-criteria decision-making methods for comparison. Here the authors use CICDDoS2019 datasets consisting of Windows benign and the most vanguard for shared bouts. Hill-climbing algorithm may be incorporated to select best features. The time-based pragmatic data can be extracted from the mainsheet for classification as distributed cyber-policy violator or legitimate benign using decision tree (DT) with analytical hierarchy process (AHP) (DT-AHP), support vector machine (SVM) with technique for order of preference by similarity to ideal solution (SVM-TOPSIS) and mixed model of k-nearest neighbor (KNN AHP-TOPSIS) algorithms.
- Subjects :
- 021110 strategic, defence & security studies
business.industry
Computer science
0211 other engineering and technologies
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
02 engineering and technology
Computer security
computer.software_genre
business
computer
Automation
Subjects
Details
- Database :
- OpenAIRE
- Accession number :
- edsair.doi...........391193a63efb3db0a67ce1edb7c93ee3