[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rajabi et al., 2024 - Google Patents

An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm

Rajabi et al., 2024

Document ID
757065878291857341
Author
Rajabi S
Asgari S
Jamali S
Fotohi R
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Due to the dynamic nature and limited resources in wireless networks, attack occurrence is inevitable. These attacks can damage or weaken the transmitted packets and threaten the entire system's efficiency. As a result, in such a situation, great and sometimes irreparableĀ ā€¦
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Do et al. Deep learning for phishing detection: Taxonomy, current challenges and future directions
Al Shorman et al. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection
Dina et al. Intrusion detection based on machine learning techniques in computer networks
Gharehchopogh et al. A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT
Guizani et al. A network function virtualization system for detecting malware in large IoT based networks
Thilagam et al. Intrusion detection for network based cloud computing by custom RC-NN and optimization
Gupta et al. A novel data poisoning attack in federated learning based on inverted loss function
Ugochukwu et al. An intrusion detection system using machine learning algorithm
Pham et al. Phishing-aware: A neuro-fuzzy approach for anti-phishing on fog networks
Wanda et al. DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
Om Kumar et al. Intrusion detection model for IoT using recurrent kernel convolutional neural network
Shukla An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system
Salahi et al. Predicting network attacks using ontology-driven inference
Zarai Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
Shi et al. A framework of intrusion detection system based on Bayesian network in IoT
Djenouri et al. Interpretable intrusion detection for next generation of Internet of Things
Alohali et al. Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system
Abirami et al. BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection
Dwivedi Detecting anonymous attacks in wireless communication medium using adaptive grasshopper optimization algorithm
Mahajan et al. Jaya-Mutated Leader Algorithm Based Deep Feed Forward Neural Network for Intrusion Detection Using Cloud Computing
Sahingoz et al. Internet of Things (IoTs) security: Intrusion detection using deep learning
Rajabi et al. An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm
Anusha et al. Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks
Anju et al. M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection
Varastan et al. Hardening of the Internet of Things by using an intrusion detection system based on deep learning