Mani et al., 2022 - Google Patents
A new intrusion detection and prevention system using a hybrid deep neural network in cloud environmentMani et al., 2022
- Document ID
- 9524111750026888756
- Author
- Mani S
- Sundan B
- Thangasamy A
- Govindaraj L
- Publication year
- Publication venue
- Computer Networks, Big Data and IoT: Proceedings of ICCBI 2021
External Links
Snippet
Cloud computing has become an innovative technology, with distributed on-demand services; it has an attractive target for potential cyber-attacks by intruders. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are the most commonly used …
- 238000001514 detection method 0 title abstract description 64
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mazini et al. | Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms | |
Crespo-Martínez et al. | SQL injection attack detection in network flow data | |
Yavanoglu et al. | A review on cyber security datasets for machine learning algorithms | |
Alkasassbeh et al. | Detecting distributed denial of service attacks using data mining techniques | |
Albahar | Recurrent Neural Network Model Based on a New Regularization Technique for Real‐Time Intrusion Detection in SDN Environments | |
Mani et al. | A new intrusion detection and prevention system using a hybrid deep neural network in cloud environment | |
Ortega-Fernandez et al. | Network intrusion detection system for DDoS attacks in ICS using deep autoencoders | |
Catillo et al. | Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study | |
Amrollahi et al. | Enhancing network security via machine learning: opportunities and challenges | |
Oladimeji et al. | Review on insider threat detection techniques | |
Singh Samom et al. | Distributed denial of service (DDoS) attacks detection: A machine learning approach | |
Ageyev et al. | Traffic monitoring and abnormality detection methods for decentralized distributed networks | |
Sharon et al. | An intelligent intrusion detection system using hybrid deep learning approaches in cloud environment | |
Gniewkowski | An overview of DoS and DDoS attack detection techniques | |
Nagar et al. | Novel approach of intrusion detection classification deeplearning using SVM | |
Brandao et al. | Log Files Analysis for Network Intrusion Detection | |
Sait et al. | Multi-level anomaly detection: Relevance of big data analytics in networks | |
Wang et al. | Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection | |
Parfenov et al. | Research application of ensemble machine learning methods to the problem of multiclass classification of DDoS attacks identification | |
Kerrakchou et al. | Selection of efficient machine learning algorithm on Bot-IoT dataset for intrusion detection in internet of things networks | |
Babbar et al. | Evaluation of deep learning models in its software-defined intrusion detection systems | |
Hamarshe et al. | Detection of DDoS Attacks in Software Defined Networking Using Machine Learning Models | |
Ahanger et al. | Building an intrusion detection system using supervised machine learning classifiers with feature selection | |
Kakavand et al. | O-ADPI: online adaptive deep-packet inspector using Mahalanobis distance map for web service attacks classification | |
Barrionuevo et al. | An anomaly detection model in a lan using k-nn and high performance computing techniques |