Tien et al., 2021 - Google Patents
Using Autoencoders for Anomaly Detection and Transfer Learning in Iot. Computers 2021, 10, 88Tien et al., 2021
View PDF- Document ID
- 5786207986091857318
- Author
- Tien C
- Huang T
- Chen P
- Wang J
- Publication year
External Links
Snippet
With the development of Internet of Things (IoT) technologies, more and more smart devices are connected to the Internet. Since these devices were designed for better connections with each other, very limited security mechanisms have been considered. It would be costly to …
- 238000001514 detection method 0 title abstract description 75
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ortiz et al. | DeviceMien: network device behavior modeling for identifying unknown IoT devices | |
CN109450842B (en) | Network malicious behavior recognition method based on neural network | |
Aljawarneh et al. | Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model | |
CN107360145B (en) | Multi-node honeypot system and data analysis method thereof | |
Sija et al. | A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view | |
Kheddar et al. | Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review | |
Malik et al. | Feature engineering and machine learning framework for DDoS attack detection in the standardized internet of things | |
US11449604B2 (en) | Computer security | |
Khreich et al. | Combining heterogeneous anomaly detectors for improved software security | |
Bodström et al. | State of the art literature review on network anomaly detection with deep learning | |
Diao et al. | EC-GCN: A encrypted traffic classification framework based on multi-scale graph convolution networks | |
Salunkhe et al. | Security enrichment in intrusion detection system using classifier ensemble | |
Mubarak et al. | Industrial datasets with ICS testbed and attack detection using machine learning techniques | |
Xu et al. | [Retracted] DDoS Detection Using a Cloud‐Edge Collaboration Method Based on Entropy‐Measuring SOM and KD‐Tree in SDN | |
Liang et al. | FECC: DNS tunnel detection model based on CNN and clustering | |
Ali et al. | A generic machine learning approach for IoT device identification | |
Nie et al. | M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system | |
CN112507336A (en) | Server-side malicious program detection method based on code characteristics and flow behaviors | |
Othman et al. | An intelligent intrusion detection system for internet of things attack detection and identification using machine learning | |
Shi et al. | Malware detection for internet of things using one-class classification | |
Yin et al. | Anomaly traffic detection based on feature fluctuation for secure industrial internet of things | |
Yang et al. | Fingerprinting Industrial IoT devices based on multi-branch neural network | |
Tien et al. | Using Autoencoders for Anomaly Detection and Transfer Learning in Iot. Computers 2021, 10, 88 | |
Chin-Wei et al. | Using Autoencoders for Anomaly Detection and Transfer Learning in IoT | |
Berthier et al. | An evaluation of connection characteristics for separating network attacks |