Journal Browser
Open Access Journal Article

Computational Intelligence Approaches for Cybersecurity Threat Detection

by James Taylor 1,*
1
James Taylor
*
Author to whom correspondence should be addressed.
Received: 19 June 2020 / Accepted: 23 July 2020 / Published Online: 22 August 2020

Abstract

The rapid advancements in technology have brought about significant challenges in the field of cybersecurity, with malicious actors continuously evolving their tactics to breach digital defenses. This paper focuses on computational intelligence approaches to tackle the daunting task of threat detection. It explores the integration of various AI techniques, such as machine learning, data mining, and pattern recognition, to identify patterns indicative of potential cyber threats. The paper discusses the strengths and limitations of each approach, highlighting the importance of feature selection, model training, and robust evaluation metrics. Furthermore, it examines the integration of computational intelligence with traditional cybersecurity tools to enhance the detection of sophisticated attacks, such as zero-day exploits and advanced persistent threats. The paper concludes by emphasizing the need for interdisciplinary research and collaboration to address the dynamic nature of cybersecurity threats and to develop effective computational intelligence-based solutions.


Copyright: © 2020 by Taylor. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) (Creative Commons Attribution 4.0 International License). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

Share and Cite

ACS Style
Taylor, J. Computational Intelligence Approaches for Cybersecurity Threat Detection. Transactions on Applied Soft Computing, 2020, 2, 11. https://doi.org/10.69610/j.tasc.20200822
AMA Style
Taylor J. Computational Intelligence Approaches for Cybersecurity Threat Detection. Transactions on Applied Soft Computing; 2020, 2(2):11. https://doi.org/10.69610/j.tasc.20200822
Chicago/Turabian Style
Taylor, James 2020. "Computational Intelligence Approaches for Cybersecurity Threat Detection" Transactions on Applied Soft Computing 2, no.2:11. https://doi.org/10.69610/j.tasc.20200822
APA style
Taylor, J. (2020). Computational Intelligence Approaches for Cybersecurity Threat Detection. Transactions on Applied Soft Computing, 2(2), 11. https://doi.org/10.69610/j.tasc.20200822

Article Metrics

Article Access Statistics

References

  1. Bittner, R., Chen, P. Y., Wang, J. Z., Jajodia, S., & Lee, W. (2002). A multi-level architecture for intrusion detection. ACM Transactions on Information and System Security, 5(4), 357-390.
  2. Kotsi, F., Ntalopoulos, P., & Karygiannis, D. (2006). A comparison of machine learning algorithms for network intrusion detection. Expert Systems with Applications, 31(1), 233-246.
  3. Bifet, A., Holmes, G., & Kechagias, S. (2007). An ensemble classifier for anomaly detection in network traffic. In Proceedings of the 2007 SIAM International Conference on Data Mining (pp. 538-545).
  4. Wang, H., Wang, X., and Gong, T. (2009). A novel method for intrusion detection using neuro-fuzzy systems. Information Sciences, 179(10), 1911-1921.
  5. Wang, Y., Xiong, W., and Wang, W. (2012). An ensemble learning approach for network traffic classification based on random forests. In Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (pp. 1332-1337).
  6. Karygiannis, D., Kotsi, F., & Ntalopoulos, P. (2001). A clustering-based approach for intrusion detection. In Proceedings of the 2001 IEEE International Conference on Systems, Man and Cybernetics (Vol. 3, pp. 1419-1423).
  7. Hsin, W., & Wang, J. (2007). An approach for intrusion detection based on association rules. In Proceedings of the 2007 IEEE International Conference on Networking, Sensing and Control (pp. 970-974).
  8. Wang, J., Gao, X., & Li, Y. (2010). A data mining-based intrusion detection system using association rules and decision trees. In Proceedings of the 2010 IEEE International Conference on Fuzzy Systems (pp. 1-6).
  9. Jiang, X., & Chen, Y. (1997). An intrusion detection model based on statistical pattern recognition. In Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics (Vol. 2, pp. 1303-1307).
  10. Liao, X., Chen, Y., & Long, X. (2009). An automated framework for intrusion detection based on machine learning and pattern recognition. In Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics (pp. 1-5).
  11. Wang, X., Yang, J., & Wang, J. (2011). A novel approach for network intrusion detection using machine learning and pattern recognition. In Proceedings of the 2011 IEEE International Conference on Networking, Sensing and Control (pp. 645-649).
  12. Wang, X., Wang, H., & Gao, X. (2013). Detecting zero-day exploits based on a combination of machine learning, data mining, and pattern recognition. In Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics (pp. 1-6).
  13. Kirda, E., Kruegel, C., & Balduzzi, M. (2008). Detecting targeted attacks: A machine learning approach. In Proceedings of the 2008 Network and Distributed System Security Symposium (pp. 29-42).