[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rajabi et al., 2024 - Google Patents

An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm

Rajabi et al., 2024

Document ID
757065878291857341
Author
Rajabi S
Asgari S
Jamali S
Fotohi R
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Due to the dynamic nature and limited resources in wireless networks, attack occurrence is inevitable. These attacks can damage or weaken the transmitted packets and threaten the entire system's efficiency. As a result, in such a situation, great and sometimes irreparable …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Do et al. Deep learning for phishing detection: Taxonomy, current challenges and future directions
Al Shorman et al. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection
Dina et al. Intrusion detection based on machine learning techniques in computer networks
RM et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture
Mebawondu et al. Network intrusion detection system using supervised learning paradigm
Guizani et al. A network function virtualization system for detecting malware in large IoT based networks
Thilagam et al. Intrusion detection for network based cloud computing by custom RC-NN and optimization
Ugochukwu et al. An intrusion detection system using machine learning algorithm
Pham et al. Phishing-aware: A neuro-fuzzy approach for anti-phishing on fog networks
Wanda et al. DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
Om Kumar et al. Intrusion detection model for IoT using recurrent kernel convolutional neural network
Shukla An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system
Salahi et al. Predicting network attacks using ontology-driven inference
Zarai Recurrent neural networks & deep neural networks based on intrusion detection system
Shi et al. A framework of intrusion detection system based on Bayesian network in IoT
Djenouri et al. Interpretable intrusion detection for next generation of Internet of Things
Almotairi et al. Efficient Intrusion Detection using OptCNN-LSTM Model based on hybrid Correlation-based Feature Selection in IoMT.
Alohali et al. Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system
Mahajan et al. Jaya-Mutated Leader Algorithm Based Deep Feed Forward Neural Network For Intrusion Detection Using Cloud Computing
Abirami et al. BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection
Manavi et al. A new intrusion detection system based on gated recurrent unit (GRU) and genetic algorithm
Varastan et al. Hardening of the internet of things by using an intrusion detection system based on deep learning
Rajabi et al. An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm
Gamal et al. Improving intrusion detection using LSTM-RNN to protect drones’ networks
Anju et al. M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection