Ahmad et al., 2018 - Google Patents
Role of machine learning and data mining in internet security: standing state with future directionsAhmad et al., 2018
View PDF- Document ID
- 1202569021290395581
- Author
- Ahmad B
- Jian W
- Anwar Ali Z
- Publication year
- Publication venue
- Journal of Computer Networks and Communications
External Links
Snippet
As time progresses with vast development of information technology, a large number of industries are more dependent on network connections for sensitive business trading and security matters. Communications and networks are highly vulnerable to threats because of …
- 238000007418 data mining 0 title abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11973774B2 (en) | Multi-stage anomaly detection for process chains in multi-host environments | |
Alqahtani et al. | Cyber intrusion detection using machine learning classification techniques | |
Molina-Coronado et al. | Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process | |
Ahmad et al. | Role of machine learning and data mining in internet security: standing state with future directions | |
Kotenko et al. | Systematic literature review of security event correlation methods | |
Kheddar et al. | Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review | |
Aleroud et al. | Contextual information fusion for intrusion detection: a survey and taxonomy | |
Levshun et al. | A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities | |
US20230132703A1 (en) | Capturing Importance In A Network Using Graph Theory | |
Koshal et al. | Cascading of C4. 5 decision tree and support vector machine for rule based intrusion detection system | |
US20230135660A1 (en) | Educational Tool for Business and Enterprise Risk Management | |
Jiang et al. | Sok: Applying machine learning in security-a survey | |
Scaranti et al. | Unsupervised online anomaly detection in Software Defined Network environments | |
Abirami et al. | Building an ensemble learning based algorithm for improving intrusion detection system | |
Sovilj et al. | A comparative evaluation of unsupervised deep architectures for intrusion detection in sequential data streams | |
Kosamkar et al. | Improved Intrusion detection system using C4. 5 decision tree and support vector machine | |
Al-Utaibi et al. | Intrusion detection taxonomy and data preprocessing mechanisms | |
Bhuyan et al. | Network traffic anomaly detection techniques and systems | |
Mahboubi et al. | Evolving techniques in cyber threat hunting: A systematic review | |
Razak | A study on IDS for preventing Denial of Service attack using outliers techniques | |
Naz et al. | Ensemble learning-based IDS for sensors telemetry data in IoT networks | |
Kheddar et al. | Deep transfer learning applications in intrusion detection systems: A comprehensive review | |
Soliman et al. | Rank: Ai-assisted end-to-end architecture for detecting persistent attacks in enterprise networks | |
Ravi et al. | A robust intrusion detection system using machine learning techniques for MANET | |
Rani et al. | Analysis of machine learning and deep learning intrusion detection system in Internet of Things network |