Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/6248
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Terzi, Ramazan | - |
dc.contributor.author | Yavanoğlu, Uraz | - |
dc.contributor.author | Sinanç, Duygu | - |
dc.contributor.author | Oğuz, Doğaç | - |
dc.contributor.author | Çakır, Semra | - |
dc.date.accessioned | 2021-09-11T15:35:28Z | - |
dc.date.available | 2021-09-11T15:35:28Z | - |
dc.date.issued | 2014 | en_US |
dc.identifier.citation | 13th International Conference on Machine Learning and Applications (ICMLA) -- DEC 03-06, 2014 -- Detroit, MI | en_US |
dc.identifier.isbn | 978-1-4799-7415-3 | - |
dc.identifier.uri | https://doi.org/10.1109/ICMLA.2014.82 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/6248 | - |
dc.description.abstract | In this study, malicious users who cause to resource exhausting are tried to detect in a telecommunication company network. Non-Legitimate users could cause lack of information availability and need countermeasures to prevent threat or limit permissions on the system. For this purpose, ANN based intelligent system is proposed and compared to SVM which is well known classification technique. According to results, proposed technique has achieved approximately 70% general success rate, 33% false positive rate and 27% false negative rate in controlled environment. Also ANN has high ability to work compare to SVM for our dataset. As a result proposed technique and developed application shows sufficient and acceptable defense mechanism in huge company networks. We discussed about this is initial study and ongoing research which is compared to the current literature. By the way, this study also shows that non security information such as users mobile experiences could be potential usage to prevent resource exhausting also known as DoS related attacks. | en_US |
dc.description.sponsorship | IEEE Comp Soc, AML&A, IEEE, Wayne State Univ | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2014 13Th International Conference On Machine Learning And Applications (Icmla) | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | resource exhausting | en_US |
dc.subject | artificial neural network(ANN) | en_US |
dc.subject | DoS attack | en_US |
dc.subject | mobile store security | en_US |
dc.title | An Intelligent Technique for Detecting Malicious Users on Mobile Stores | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 470 | en_US |
dc.identifier.endpage | 477 | en_US |
dc.authorid | 0000-0002-3332-9414 | - |
dc.authorid | 0000-0003-2345-8666 | - |
dc.identifier.wos | WOS:000380459000079 | en_US |
dc.identifier.scopus | 2-s2.0-84946692877 | en_US |
dc.institutionauthor | Oğuz, Doğaç | - |
dc.identifier.doi | 10.1109/ICMLA.2014.82 | - |
dc.relation.publicationcategory | Diğer | en_US |
dc.relation.conference | 13th International Conference on Machine Learning and Applications (ICMLA) | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.