April 11, 2022, 1:20 a.m. | Amardeep Singh, Julian Jang-Jaccard

cs.CR updates on arXiv.org arxiv.org

The massive growth of network traffic data leads to a large volume of
datasets. Labeling these datasets for identifying intrusion attacks is very
laborious and error-prone. Furthermore, network traffic data have complex
time-varying non-linear relationships. The existing state-of-the-art intrusion
detection solutions use a combination of various supervised approaches along
with fused features subsets based on correlations in traffic data. These
solutions often require high computational cost, manual support in fine-tuning
intrusion detection models, and labeling of data that limit real-time …

detection intrusion intrusion detection networks scale

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Officer Level 1 (L1)

@ NTT DATA | Virginia, United States of America

Alternance - Analyste VOC - Cybersécurité - Île-De-France

@ Sopra Steria | Courbevoie, France

Senior Security Researcher, SIEM

@ Huntress | Remote US or Remote CAN

Cyber Security Engineer Lead

@ ASSYSTEM | Bridgwater, United Kingdom