12
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Corporate network anomaly detection methodology utilizing machine learning algorithms

ORCID Icon, , , &
Received 07 Apr 2023, Accepted 28 Jun 2024, Published online: 04 Jul 2024

References

  • Misra S, Li H, He J. Machine learning for subsurface characterization. Oxford: Gulf Professional Publishing; 2019.
  • Lukhmanova GK, Sakibaeva KS, Seisekenova MB, et al. Improving the competitiveness of crop production in the Republic of Kazakhstan. J Soc Sci Res. 2018b;3:178–181.
  • Lukhmanova GK, Syzdykbayeva NB, Baibulekova LA, et al. Food security assessment in the Republic of Kazakhstan. J Adv Res Law Econ. 2018a;9(4):1337–1342. doi: 10.14505//jarle.v9.4(34).21
  • Helbert J, D`amore M, Aye M, et al. Machine learning for planetary science. Oxford: Elsevier; 2021.
  • Baisholan N, Kubayev KE, Baisholanov TS. Modern tools for information security systems. News NAS RK SPh-M. 2021;1(1):14–18. doi: 10.32014/2021.2518-1726.2
  • Cetin A, Merci B, Gunay O, et al. Methods and techniques for fire detection. London: Academic Press; 2016.
  • Altayeva A, Baisholanova K, Tukenova L, et al. Towards smart building: exploring of indoor microclimate comfort level thermal processes. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). The 5th International Conference on Smart Computing and Communication, Almaty. LNCS; 2020;12608. p. 59–67.
  • Davies ER, Turk M. Advanced methods and deep learning in computer vision. London: Academic Press; 2021.
  • Kubayev KE. Assessment of the company’s performance in light of delay in managerial information. Int J Econ Financ Issues. 2016;6(2):223–240.
  • Shitharth S, Alshareef AM, Khadidos AO, et al. A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security. Sci Rep. 2023a;13(1):15681. doi: 10.1038/s41598-023-42257-0
  • Prashanth SK, Shitharth S, Praveen Kumar B, et al. Optimal feature selection based on evolutionary algorithm for intrusion detection. Sn Comput Sci. 2022;3(6):439. doi: 10.1007/s42979-022-01325-4
  • Shitharth S, Hariprasath M, Sonali G, et al. SCMC: smart city measurement and control process for data security with data mining algorithms. Vol. 31. Meas: Sens; 2024. p. 100980.
  • Shitharth S, Hariprasath M, Alaa O, et al. Improved security for multimedia data visualization using hierarchical clustering algorithm. In: ACM transactions on multimedia computing, communications, and applications. New York (NY): Association for Computing Machinery; 2023b. doi: 10.1145/3610296
  • Shitharth S, Mohammed GB, Ramasamy J, et al. Intelligent intrusion detection algorithm based on multi-attack for edge-assisted internet of things. In: Srivastava G, Ghosh U Lin JC, editors. Security and risk analysis for intelligent edge computing. advances in information security. Vol. 103. Cham: Springer; 2023c. doi: 10.1007/978-3-031-28150-1_6
  • Gori M. Machine learning. Berlington: Morgan Kaufmann; 2017.
  • Theodoridis S. Machine learning. London: Academic Press; 2020.
  • Sun Y. Machine learning for the analysis of multi-omics data. Methods. 2021;189:1–2. doi: 10.1016/j.ymeth.2021.02.005
  • Palahin V, Yevtushenko I, Hozhyi O. Virtualization as an environment of realization of network functions. Bull Of ChSTU. 2021;2:31–38.
  • Dvoretskyi ML, Dvoretskaya SV, Davydenko Ye O. Information technology for determining useful data while optimizing the structure and minimizing the volume of the distributed database node. Bull ChSTU. 2020;4:26–35.
  • Istratova EE, Smirnov AE, Glinin EV. Development of software for monitoring traffic characteristics in a corporate computer network. Int J Open Inf Technol. 2021;8:73–79.
  • Bakhareva NF, Tarasov VN, Shukhman AE, et al. Identification of attacks in corporate networks using machine learning. Mod Inf Technol IT Educ. 2018;3(14):626–632.
  • Bkhetan ZA, Kadlof M, Kraft A, et al. Machine learning polymer models of three-dimensional chromatin organization in human lymphoblastoid cells. Methods. 2019;166:83–90. doi: 10.1016/j.ymeth.2019.03.002
  • Dercle L, Henry T, Carre A, et al. Reinventing radiation therapy with machine learning and imaging bio-markers (radiomics): state-of-the-art, challenges and perspectives. Methods. 2021;188:44–60. doi: 10.1016/j.ymeth.2020.07.003
  • Yoon S, Lee S, Wang SLW. Machine learning methods and systems for data-driven discovery in biomedical informatics. Methods. 2017;129:1–2. doi: 10.1016/j.ymeth.2017.09.011
  • Mansouri M, Harkat M-F, Nounou H, et al. Data-driven and model-based methods for fault detection and diagnosis. Oxford: Elsevier; 2020.
  • Agrawai A, Qazi K. Detecting modeling inconsistencies in SNOMED CT using a machine learning technique. Methods. 2020;179:111–118. doi: 10.1016/j.ymeth.2020.05.019
  • Liu L, Song B, Chen K, et al. Whistle server: a high-accuracy genomic coordinate-based machine learning platform for RNA modification prediction. Methods. 2021. Available from: https://www.sciencedirect.com/science/article/abs/pii/S1046202321001821
  • Raschka S, Kaufman B. Machine learning and AI-based approaches for bioactive ligand discovery and GPCR-ligand recognition. Methods. 2020;180:89–110. doi: 10.1016/j.ymeth.2020.06.016
  • LaPierre N, Ju CJ-T, Zhou G, et al. MetaPheno: a critical evaluation of deep learning and machine learning in metagenome-based disease prediction. Methods. 2019;166:74–82. doi: 10.1016/j.ymeth.2019.03.003
  • Severino MK, Peng Y. Machine learning algorithms for fraud prediction in property insurance: empirical evidence using real-world microdata. Mach Learn With Appl. 2021;5:100074. doi: 10.1016/j.mlwa.2021.100074
  • Comminiello D, Principe J. Adaptive learning methods for nonlinear system modeling. Oxford: Butterworth-Heinemann; 2018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.