Babu et al., 2023 - Google Patents
Network intrusion detection using machine learning algorithmsBabu et al., 2023
- Document ID
- 11389290903136762147
- Author
- Babu B
- Reddy G
- Goud D
- Naveen K
- Reddy K
- Publication year
- Publication venue
- 2023 3rd International Conference on Smart Data Intelligence (ICSMDI)
External Links
Snippet
The advancement in wireless communication technology has led to various security challenges in networks. To combat these issues, Network Intrusion Detection Systems (NIDS) are employed to identify attacks. To enhance their accuracy in detecting intruders …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maseer et al. | Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset | |
Muruti et al. | A survey on anomalies detection techniques and measurement methods | |
Babu et al. | Network intrusion detection using machine learning algorithms | |
Bouke et al. | An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability | |
Kumar et al. | An approach for intrusion detection using text mining techniques | |
Dubey et al. | KBB: A hybrid method for intrusion detection | |
Singh et al. | User behaviour based insider threat detection in critical infrastructures | |
Ketepalli et al. | Data Preparation and Pre-processing of Intrusion Detection Datasets using Machine Learning | |
Soewu et al. | Analysis of Data Mining-Based Approach for Intrusion Detection System | |
Dharaneish et al. | Comparative analysis of deep learning and machine learning models for network intrusion detection | |
Majd et al. | Ransomware classification using machine learning | |
Ramish et al. | IT attack detection and classification using users event log feature and behavior analytics through Fourier EEG signal | |
Rahman et al. | An exploratory analysis of feature selection for malware detection with simple machine learning algorithms | |
Singla et al. | Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage | |
Hussain et al. | A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification. | |
Aleroud et al. | Detecting zero-day attacks using contextual relations | |
Arshad et al. | Comparative Study of Machine Learning Techniques for Intrusion Detection on CICIDS-2017 Dataset | |
Tran et al. | Boosted modified probabilistic neural network (BMPNN) for network intrusion detection | |
Verma et al. | Detailed analysis of intrusion detection using machine learning algorithms | |
Obeidat et al. | Dimensionality reduction and supervised learning for intrusion detection | |
Obimbo et al. | Comparison of SVMs with radial-basis function & polynomial kernels in classification of categories in intrusion detection | |
Uddin et al. | usfAD Based Effective Unknown Attack Detection Focused IDS Framework | |
Gridley et al. | Significant digits: Using large-scale blockchain data to predict fraudulent addresses | |
Shilpashree et al. | Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection in Wireless Network Using KDDCUP’99 and NSLKDD Datasets | |
Acharya | Enhancement Of Network Anomaly Detection Using Artificial Intelligence Techniques |