Reference Hub8
Ensemble Learning Mechanisms for Threat Detection: A Survey

Ensemble Learning Mechanisms for Threat Detection: A Survey

Rajakumar Arul, Rajalakshmi Shenbaga Moorthy, Ali Kashif Bashir
ISBN13: 9781522581000|ISBN10: 1522581006|ISBN13 Softcover: 9781522594765|EISBN13: 9781522581017
DOI: 10.4018/978-1-5225-8100-0.ch010
Cite Chapter Cite Chapter

MLA

Arul, Rajakumar, et al. "Ensemble Learning Mechanisms for Threat Detection: A Survey." Machine Learning and Cognitive Science Applications in Cyber Security, edited by Muhammad Salman Khan, IGI Global, 2019, pp. 240-281. https://doi.org/10.4018/978-1-5225-8100-0.ch010

APA

Arul, R., Moorthy, R. S., & Bashir, A. K. (2019). Ensemble Learning Mechanisms for Threat Detection: A Survey. In M. Khan (Ed.), Machine Learning and Cognitive Science Applications in Cyber Security (pp. 240-281). IGI Global. https://doi.org/10.4018/978-1-5225-8100-0.ch010

Chicago

Arul, Rajakumar, Rajalakshmi Shenbaga Moorthy, and Ali Kashif Bashir. "Ensemble Learning Mechanisms for Threat Detection: A Survey." In Machine Learning and Cognitive Science Applications in Cyber Security, edited by Muhammad Salman Khan, 240-281. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8100-0.ch010

Export Reference

Mendeley
Favorite

Abstract

Technology evolution in the network security space has been through many dramatic changes recently. Enhancements in the field of telecommunication systems invite fruitful security solutions to address various threats that arise due to the exponential growth in the number of users. It's crucial for upgrading the entire infrastructure to safeguard the system from specific threats. So, there is a huge demand for the learning mechanism to realize the behavior of attacks. Recent upcoming technologies like machine learning and deep learning can support in the process of learning the behavior of all types of attacks irrespective of their deployment criteria. In this chapter, the analysis of various machine learning algorithms with respect to a few scenarios that can be adopted for the benefits of improving the security standard of the network. This chapter briefly discusses various know attacks and their classification and how machine learning algorithms can be involved to overcome the popular attacks. Also, various intrusion detection and prevention schemes were discussed in detail.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.