May 25, 2022, 1:20 a.m. | Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa

cs.CR updates on arXiv.org arxiv.org

In this paper, we consider the applications of process mining in intrusion
detection. We propose a novel process mining inspired algorithm to be used to
preprocess data in intrusion detection systems (IDS). The algorithm is designed
to process the network packet data and it works well in online mode for online
intrusion detection. To test our algorithm, we used the CSE-CIC-IDS2018 dataset
which contains several common attacks. The packet data was preprocessed with
this algorithm and then fed into the …

detection intrusion intrusion detection mining process system

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Intermediate Security Engineer, (Incident Response, Trust & Safety)

@ GitLab | Remote, US

Journeyman Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Project Manager II - Compliance

@ Critical Path Institute | Tucson, AZ, USA

Junior System Engineer (m/w/d) Cyber Security 1

@ Deutsche Telekom | Leipzig, Deutschland