You are on page 1of 2

Data mining techniques for

different security applications


LITERATURE REVIEW
AND AUTHOR METHOD USED RESULT

–level Hybrid Model s The UNSW-NB15 and CICID


alous Activity Detection in IOT datasets reflect modern att
rks Author: imtiaz Ullah, scenario and deep structur
H. Mahoud network traffic information

hine Learning Based cyber intruDtree are used in a machine We implemented all the m
on detection model Author: learning based cyber intrusion Python programming langu
H sarker, yoosef B detection which we used Scikit-learn
popular machine learning l
predictive data analysis, an
executed them on a Windo
security Boolean OR ,AND is used in cyber artificial intelligence techn
security which have been used in m
cyber-attacks. With the adv
data, data mining (DM) tec
have been extensively used
improve models of cyber s
applications.
mining and machine learning Hadoop , netCDP are used in the Artificial neural system (AN

You might also like