[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Linda et al., 2009 - Google Patents

Neural network based intrusion detection system for critical infrastructures

Linda et al., 2009

View PDF
Document ID
7815659865463163779
Author
Linda O
Vollmer T
Manic M
Publication year
Publication venue
2009 international joint conference on neural networks

External Links

Snippet

Resiliency and security in control systems such as SCADA and nuclear plant's in today's world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and …
Continue reading at www.osti.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Linda et al. Neural network based intrusion detection system for critical infrastructures
Ning et al. Intrusion detection techniques
Balajinath et al. Intrusion detection through learning behavior model
Lee et al. Real time data mining-based intrusion detection
Zhu et al. Data mining for network intrusion detection: a comparison of alternative methods
CN103746961B (en) A kind of causal knowledge method for digging of cyber attack scenarios, device and server
Dasgupta et al. CIDS: An agent-based intrusion detection system
CN103905440A (en) Network security situation awareness analysis method based on log and SNMP information fusion
Yu A survey of anomaly intrusion detection techniques
CN103957203B (en) A kind of network security protection system
CN116781430B (en) Network information security system and method for gas pipe network
CN107517216A (en) A kind of network safety event correlating method
WO2024114827A1 (en) Continuous-time dynamic heterogeneous graph neural network-based apt detection method and system
Ahmad et al. Analysis of classification techniques for intrusion detection
Chen et al. Multi-level adaptive coupled method for industrial control networks safety based on machine learning
Navya et al. Intrusion detection system using deep neural networks (DNN)
Shanmugam et al. Hybrid intrusion detection systems (HIDS) using Fuzzy logic
Selim et al. Intrusion detection using multi-stage neural network
Tran Network anomaly detection
Balducelli et al. Safeguarding information intensive critical infrastructures against novel types of emerging failures
Pandeeswari et al. Analysis of Intrusion Detection Using Machine Learning Techniques
CN112822191A (en) Method for multi-dimensional data security detection in networked cooperative system
Veselý et al. Neural networks in intrusion detection systems
Last et al. Content-based methodology for anomaly detection on the web
Chaturvedi et al. Anomaly detection in network using data mining techniques