Identify Attacking Attempts through Logging on Websites and Database Systems by Machine Learning

  • Authors

    • Hasan Jameel Alwan
    • Barakat Saad Ibrahim
    • Ahmed Hamid Shaker
    https://doi.org/10.14419/ijet.v7i3.20.28420
  • machine learning, cognitive computing, data mining, artificial intelligence, pattern recognition.
  • Abstract

    we will focus on the possibility of using and applying multiple technologies of information technology including, bank accounts, pattern recognition, follow_up data, and data mining. Improve the performance of these systems and techniques through new methods of learning and training, and thus improve the performance by reducing the costs of educational sources and the preservation, study and evaluation of the previous results through conversion to machines and machine learning technology.

  • References

    1. [1] Bishop C.M. Pattern Recognition and Machine Learning / C.M. Bishop. — NY: Springer. — 2016.

      [2] Bishop Christopher. M. Pattern Recognition and Machine Learning / Christopher M. Bishop.– New York:. Springer-Verlag, 2016. - 738 p

      [3] Fukunaga K. Introduction to statistical pattern recognition / K. Fukunaga // Academic press, 2013. — 591 p.

      [4] Ghamisi P. Advanced Spectral Classifiers for Hyperspectral Images: A review / P. Ghamisi, J. Plaza, Y. Chen et al // IEEE Geoscience and Remote Sensing Magazine. — Vol. 5, N 1. — 2017. — P. 8–32.

      [5] Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. Auerbach Publications.â€

      [6] LeCun Y. Deep learning / Y. LeCun, B. Yoshua, H. Geoffrey // Nature. — Vol. 521, N 7553. — 2015. — P. 436–444

      [7] Lorenc C. Sensitivity to observations in the Met Office Global numerical weather prediction system / A. Lorenc, R. T. Marriott - Meteor. Soc., 2014.

      [8] Maulik U. Remote Sensing Image Classification: A survey of support-vectormachine-based advanced techniques / U. Maulik, D. Chakraborty // IEEE Geoscience and Remote Sensing Magazine. — Vol. 5, N 1. — 2017. — P. 33–52.

      [9] Paul Nolan. Impacts of climate change on mid-twenty-first-century rainfall in Ireland: a high-resolution regional climate model ensemble approach / Paul Nolan, John O'Sullivan, Ray McGrath- International Journal of Climatology 26., 2017

      [10] Лутц Ðœ., Программирование на Python, том II, 4-е издание. – Пер. Ñ Ð°Ð½Ð³Ð». – СПб.: Символ-ПлюÑ, 2011. – 992 Ñ.

      [11] ПрофеÑÑиональный информационно-аналитичеÑкий реÑурÑ, поÑвÑщенный машинному обучению..2018

      [12] Саттон Ð .С Обучение Ñ Ð¿Ð¾Ð´ÐºÑ€ÐµÐ¿Ð»ÐµÐ½Ð¸ÐµÐ¼ / Саттон Ð .С, Э. Г. Барто // БИÐОМ, Ð›Ð°Ð±Ð¾Ñ€Ð°Ñ‚Ð¾Ñ€Ð¸Ñ Ð·Ð½Ð°Ð½Ð¸Ð¹, 2014 – С.42-96.

  • Downloads

  • How to Cite

    Jameel Alwan, H., Saad Ibrahim, B., & Hamid Shaker, A. (2018). Identify Attacking Attempts through Logging on Websites and Database Systems by Machine Learning. International Journal of Engineering & Technology, 7(3.20), 932-934. https://doi.org/10.14419/ijet.v7i3.20.28420

    Received date: 2019-03-15

    Accepted date: 2019-03-15