A Review of Computer Vision Methods in Network Security

نویسندگان

چکیده

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker that are reported almost every day. Increasingly, we relying networked infrastructure with advent IoT, billions devices will be connected to Internet, providing attackers opportunities exploit. Traditional machine learning methods have been frequently used in context network security. However, such based statistical features extracted from sources binaries, emails, packet flows. On other hand, recent years witnessed a phenomenal growth computer vision mainly driven advances convolutional neural networks. At glance, it is not trivial see how related Nonetheless, there amount work can applied for detecting or building solutions. In this paper, provide comprehensive survey under three topics; i) phishing attempt detection, ii) malware iii) traffic anomaly detection. We also discuss existing research gaps future directions, especially focusing community industry leverage exponential build much secure systems. Finally, review set commercial products which public information available explore effectively those conclude brief overview commonly domain.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computer Vision – A Review

when a person gets lost, he uses all his senses to acquire his location and the way back to the last identified location. But what about the robots, how do they come to know their location, the source and destination. Here comes the concept of Computer Vision into the picture. The scope of this paper concerns both the developments in the field of computer vision and applications related to comp...

متن کامل

Kernel Methods in Computer Vision

Over the last years, kernel methods have established themselves as powerful tools for computer vision researchers as well as for practitioners. In this tutorial, we give an introduction to kernel methods in computer vision from a geometric perspective, introducing not only the ubiquitous support vector machines, but also less known techniques for regression, dimensionality reduction, outlier de...

متن کامل

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

reflections on taught courses of the iranian ma program in english translation: a mixed-methods study

the issue of curriculum and syllabus evaluation and revision has been in center of attention right from when curriculum came into attention of educational institutions. thus everywhere in the world in educational institutions curricula and syllabi are evaluated and revised based on the goals, the needs, existing content, etc.. in iran any curriculum is designed in a committee of specialists and...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Surveys and Tutorials

سال: 2021

ISSN: ['2373-745X', '1553-877X']

DOI: https://doi.org/10.1109/comst.2021.3086475