[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jove et al., 2022 - Google Patents

Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study

Jove et al., 2022

View HTML
Document ID
10268953003184835981
Author
Jove E
Aveleira-Mata J
Alaiz-Moretón H
Casteleiro-Roca J
Marcos del Blanco D
Zayas-Gato F
Quintián H
Calvo-Rolle J
Publication year
Publication venue
Electronics

External Links

Snippet

The ever-increasing number of smart devices connected to the internet poses an unprecedented security challenge. This article presents the implementation of an Intrusion Detection System (IDS) based on the deployment of different one-class classifiers to prevent …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements

Similar Documents

Publication Publication Date Title
Maurya et al. Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT
Javeed et al. SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT
Alkhateeb et al. Hybrid blockchain platforms for the internet of things (IoT): A systematic literature review
Banaamah et al. Intrusion detection in iot using deep learning
Chaganti et al. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things
Izadi et al. A data fusion method in wireless sensor networks
Savanović et al. Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning
Rastenis et al. E-mail-based phishing attack taxonomy
Bodström et al. A novel deep learning stack for APT detection
Javeed et al. A hybrid intelligent framework to combat sophisticated threats in secure industries
Benaddi et al. Anomaly detection in industrial IoT using distributional reinforcement learning and generative adversarial networks
Bahaa et al. Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review
Alterazi et al. Prevention of cyber security with the internet of things using particle swarm optimization
Attou et al. Towards an intelligent intrusion detection system to detect malicious activities in cloud computing
Jove et al. Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study
Popoola et al. Memory-efficient deep learning for botnet attack detection in IoT networks
Qu et al. Enable fair proof-of-work (pow) consensus for blockchains in iot by miner twins (mint)
Afrifa et al. Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers
Manderna et al. Vehicular network intrusion detection using a cascaded deep learning approach with multi-variant metaheuristic
Li et al. Investigating the influence of special on–off attacks on challenge-based collaborative intrusion detection networks
Lee et al. Detection and prevention of DDoS attacks on the IoT
Novikova et al. Federated learning for intrusion detection in the critical infrastructures: Vertically partitioned data use case
Alabsi et al. Conditional tabular generative adversarial based intrusion detection system for detecting ddos and dos attacks on the internet of things networks
Kantartopoulos et al. Exploring adversarial attacks and defences for fake twitter account detection
Lazzarini et al. Federated learning for IoT intrusion detection