Slide 9
Slide 9 text
Introduction
Literature Review - Representations
• Ontological representations of attacks are mostly limited to the general view of network
attacks. non-specific view
• Taxonomies for attacks, vulnerabilities, and weaknesses (Capec, CVE, and CWE). Lack of
logical assumptions, rules, and reasoning
• Statistical, analytical, and machine learning detection methods. Invariant, convergence
problem, lack of extendability for new concepts, and curse of dimensionality
• SVM
• Clustering and classification algorithms.
• K-Means, DBSCAN, OPTICS, SOM, etc
• Evolutionary algorithms
• Neural networks