Jove et al., 2022 - Google Patents
Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case studyJove et al., 2022
View HTML- Document ID
- 10268953003184835981
- Author
- Jove E
- Aveleira-Mata J
- Alaiz-Moretón H
- Casteleiro-Roca J
- Marcos del Blanco D
- Zayas-Gato F
- Quintián H
- Calvo-Rolle J
- Publication year
- Publication venue
- Electronics
External Links
Snippet
The ever-increasing number of smart devices connected to the internet poses an unprecedented security challenge. This article presents the implementation of an Intrusion Detection System (IDS) based on the deployment of different one-class classifiers to prevent …
- 238000001514 detection method 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maurya et al. | Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT | |
Javeed et al. | SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT | |
Alkhateeb et al. | Hybrid blockchain platforms for the internet of things (IoT): A systematic literature review | |
Banaamah et al. | Intrusion detection in iot using deep learning | |
Chaganti et al. | A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things | |
Izadi et al. | A data fusion method in wireless sensor networks | |
Savanović et al. | Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning | |
Rastenis et al. | E-mail-based phishing attack taxonomy | |
Bodström et al. | A novel deep learning stack for APT detection | |
Javeed et al. | A hybrid intelligent framework to combat sophisticated threats in secure industries | |
Benaddi et al. | Anomaly detection in industrial IoT using distributional reinforcement learning and generative adversarial networks | |
Bahaa et al. | Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review | |
Alterazi et al. | Prevention of cyber security with the internet of things using particle swarm optimization | |
Attou et al. | Towards an intelligent intrusion detection system to detect malicious activities in cloud computing | |
Jove et al. | Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study | |
Popoola et al. | Memory-efficient deep learning for botnet attack detection in IoT networks | |
Qu et al. | Enable fair proof-of-work (pow) consensus for blockchains in iot by miner twins (mint) | |
Afrifa et al. | Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers | |
Manderna et al. | Vehicular network intrusion detection using a cascaded deep learning approach with multi-variant metaheuristic | |
Li et al. | Investigating the influence of special on–off attacks on challenge-based collaborative intrusion detection networks | |
Lee et al. | Detection and prevention of DDoS attacks on the IoT | |
Novikova et al. | Federated learning for intrusion detection in the critical infrastructures: Vertically partitioned data use case | |
Alabsi et al. | Conditional tabular generative adversarial based intrusion detection system for detecting ddos and dos attacks on the internet of things networks | |
Kantartopoulos et al. | Exploring adversarial attacks and defences for fake twitter account detection | |
Lazzarini et al. | Federated learning for IoT intrusion detection |