[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tien et al., 2021 - Google Patents

Using Autoencoders for Anomaly Detection and Transfer Learning in Iot. Computers 2021, 10, 88

Tien et al., 2021

View PDF
Document ID
5786207986091857318
Author
Tien C
Huang T
Chen P
Wang J
Publication year

External Links

Snippet

With the development of Internet of Things (IoT) technologies, more and more smart devices are connected to the Internet. Since these devices were designed for better connections with each other, very limited security mechanisms have been considered. It would be costly to …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Ortiz et al. DeviceMien: network device behavior modeling for identifying unknown IoT devices
CN109450842B (en) Network malicious behavior recognition method based on neural network
Aljawarneh et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
CN107360145B (en) Multi-node honeypot system and data analysis method thereof
Sija et al. A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view
Kheddar et al. Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Malik et al. Feature engineering and machine learning framework for DDoS attack detection in the standardized internet of things
US11449604B2 (en) Computer security
Khreich et al. Combining heterogeneous anomaly detectors for improved software security
Bodström et al. State of the art literature review on network anomaly detection with deep learning
Diao et al. EC-GCN: A encrypted traffic classification framework based on multi-scale graph convolution networks
Salunkhe et al. Security enrichment in intrusion detection system using classifier ensemble
Mubarak et al. Industrial datasets with ICS testbed and attack detection using machine learning techniques
Xu et al. [Retracted] DDoS Detection Using a Cloud‐Edge Collaboration Method Based on Entropy‐Measuring SOM and KD‐Tree in SDN
Liang et al. FECC: DNS tunnel detection model based on CNN and clustering
Ali et al. A generic machine learning approach for IoT device identification
Nie et al. M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system
CN112507336A (en) Server-side malicious program detection method based on code characteristics and flow behaviors
Othman et al. An intelligent intrusion detection system for internet of things attack detection and identification using machine learning
Shi et al. Malware detection for internet of things using one-class classification
Yin et al. Anomaly traffic detection based on feature fluctuation for secure industrial internet of things
Yang et al. Fingerprinting Industrial IoT devices based on multi-branch neural network
Tien et al. Using Autoencoders for Anomaly Detection and Transfer Learning in Iot. Computers 2021, 10, 88
Chin-Wei et al. Using Autoencoders for Anomaly Detection and Transfer Learning in IoT
Berthier et al. An evaluation of connection characteristics for separating network attacks