Linda et al., 2009 - Google Patents
Neural network based intrusion detection system for critical infrastructuresLinda et al., 2009
View PDF- Document ID
- 7815659865463163779
- Author
- Linda O
- Vollmer T
- Manic M
- Publication year
- Publication venue
- 2009 international joint conference on neural networks
External Links
Snippet
Resiliency and security in control systems such as SCADA and nuclear plant's in today's world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and …
- 230000001537 neural 0 title abstract description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Linda et al. | Neural network based intrusion detection system for critical infrastructures | |
Ning et al. | Intrusion detection techniques | |
Balajinath et al. | Intrusion detection through learning behavior model | |
Lee et al. | Real time data mining-based intrusion detection | |
Zhu et al. | Data mining for network intrusion detection: a comparison of alternative methods | |
CN103746961B (en) | A kind of causal knowledge method for digging of cyber attack scenarios, device and server | |
Dasgupta et al. | CIDS: An agent-based intrusion detection system | |
CN103905440A (en) | Network security situation awareness analysis method based on log and SNMP information fusion | |
Yu | A survey of anomaly intrusion detection techniques | |
CN103957203B (en) | A kind of network security protection system | |
CN116781430B (en) | Network information security system and method for gas pipe network | |
CN107517216A (en) | A kind of network safety event correlating method | |
WO2024114827A1 (en) | Continuous-time dynamic heterogeneous graph neural network-based apt detection method and system | |
Ahmad et al. | Analysis of classification techniques for intrusion detection | |
Chen et al. | Multi-level adaptive coupled method for industrial control networks safety based on machine learning | |
Navya et al. | Intrusion detection system using deep neural networks (DNN) | |
Shanmugam et al. | Hybrid intrusion detection systems (HIDS) using Fuzzy logic | |
Selim et al. | Intrusion detection using multi-stage neural network | |
Tran | Network anomaly detection | |
Balducelli et al. | Safeguarding information intensive critical infrastructures against novel types of emerging failures | |
Pandeeswari et al. | Analysis of Intrusion Detection Using Machine Learning Techniques | |
CN112822191A (en) | Method for multi-dimensional data security detection in networked cooperative system | |
Veselý et al. | Neural networks in intrusion detection systems | |
Last et al. | Content-based methodology for anomaly detection on the web | |
Chaturvedi et al. | Anomaly detection in network using data mining techniques |