*Learning to create and exploit aggregative and relational properties of flow-sets
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F15%3A00241061" target="_blank" >RIV/68407700:21230/15:00241061 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
*Learning to create and exploit aggregative and relational properties of flow-sets
Original language description
*In the 2013/2014 phase of this collaboration project IDA developed a new method formalizing the extraction of flow-sets, from an incoming network flow sequence, satisfying existing event-type models, so that the recall of assembled events, i.e. exploredattacks, is maximized. In the subsequent phase of 2014/2015 the research objective for IDA was to build on top of the previous efforts to develop methods for learning of these models prescribing how events can be assembled within the constructed framework. This was to employ machine learning methods exploiting aggregative and relational information from general flow sets in order to detect malicious behavior.
Czech name
—
Czech description
—
Classification
Type
V<sub>souhrn</sub> - Summary research report
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
—
Continuities
N - Vyzkumna aktivita podporovana z neverejnych zdroju
Others
Publication year
2015
Confidentiality
C - Předmět řešení projektu podléhá obchodnímu tajemství (§ 504 Občanského zákoníku), ale název projektu, cíle projektu a u ukončeného nebo zastaveného projektu zhodnocení výsledku řešení projektu (údaje P03, P04, P15, P19, P29, PN8) dodané do CEP, jsou upraveny tak, aby byly zveřejnitelné.
Data specific for result type
Number of pages
2
Place of publication
Praha
Publisher/client name
CISCO SYSTEMS (Czech Republic), s.r.o.
Version
—