Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Risto Vaarandi"'
Publikováno v:
IEEE Access, Vol 11, Pp 140428-140442 (2023)
The class imbalance problem negatively impacts learning algorithms’ performance in minority classes which may constitute more severe attacks than the majority ones. This study investigates the benefits of balancing strategies and imbalanced learnin
Externí odkaz:
https://doaj.org/article/3957ff742cb843709f2b76d6ee93a646
Autor:
Frank Korving, Risto Vaarandi
Publikováno v:
International Conference on Cyber Warfare and Security. 18:550-559
Computer networks and systems are under an ever-increasing risk of being attacked and abused. High-quality datasets can assist with in-depth analysis of attack scenarios, improve detection rules, and help educate analysts. However, existing solutions
Autor:
Risto Vaarandi
Publikováno v:
CSR
Network IDS is a widely used security monitoring technology for detecting cyber attacks, malware activity, and other unwanted network traffic. Unfortunately, network IDSs are known to generate a large number of alerts which overwhelm the human analys
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030228675
During the last decade, active learning and e-learning methods have become increasingly popular, and a number of universities have redesigned their courses by replacing lectures with online content. Since traditional lecture-based teaching methods ha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a33b3baa2fb30429003070a5d23e612
https://doi.org/10.1007/978-3-030-22868-2_45
https://doi.org/10.1007/978-3-030-22868-2_45
Publikováno v:
NOMS
System logs provide valuable information about the health status of IT systems and computer networks. Therefore, log file monitoring has been identified as an important system and network management technique. While many solutions have been developed
Autor:
Risto Vaarandi, Bernhards Blumbergs
Publikováno v:
MILCOM
Fuzzing is a critical part of secure software development life-cycle, for finding vulnerabilities, developing exploits, and reverse engineering. This relies on appropriate approaches, tools and frameworks. File and protocol fuzzing is well covered, m
Autor:
Risto Vaarandi, Chen Zhuge
Publikováno v:
2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).
Nowadays, many organizations collect large volumes of event log data on a daily basis, and the analysis of collected data is a challenging task. For this purpose, data mining methods have been suggested in past research papers, and several data clust
Publikováno v:
MILCOM
Today, event logging is a widely accepted concept with a number of event formatting standards and event collection protocols. Event logs contain valuable information not only about system faults and performance issues, but also about security inciden
Publikováno v:
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec
The Internet Protocol Version 6 (IPv6) transition opens a wide scope for potential attack vectors. IPv6 transition mechanisms could allow the set-up of covert egress communication channels over an IPv4-only or dual-stack network, resulting in full co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c2617ef95ef7bed9fe77c1477e5ebf1d
https://doi.org/10.1007/978-3-319-47560-8_6
https://doi.org/10.1007/978-3-319-47560-8_6
Autor:
Risto Vaarandi, Mauno Pihelgas
Publikováno v:
CNSM
Modern IT systems often produce large volumes of event logs, and event pattern discovery is an important log management task. For this purpose, data mining methods have been suggested in many previous works. In this paper, we present the LogCluster a