[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ahmad et al., 2018 - Google Patents

Role of machine learning and data mining in internet security: standing state with future directions

Ahmad et al., 2018

View PDF @Full View
Document ID
1202569021290395581
Author
Ahmad B
Jian W
Anwar Ali Z
Publication year
Publication venue
Journal of Computer Networks and Communications

External Links

Snippet

As time progresses with vast development of information technology, a large number of industries are more dependent on network connections for sensitive business trading and security matters. Communications and networks are highly vulnerable to threats because of …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
US11973774B2 (en) Multi-stage anomaly detection for process chains in multi-host environments
Alqahtani et al. Cyber intrusion detection using machine learning classification techniques
Molina-Coronado et al. Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process
Ahmad et al. Role of machine learning and data mining in internet security: standing state with future directions
Kotenko et al. Systematic literature review of security event correlation methods
Kheddar et al. Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Aleroud et al. Contextual information fusion for intrusion detection: a survey and taxonomy
Levshun et al. A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
US20230132703A1 (en) Capturing Importance In A Network Using Graph Theory
Koshal et al. Cascading of C4. 5 decision tree and support vector machine for rule based intrusion detection system
US20230135660A1 (en) Educational Tool for Business and Enterprise Risk Management
Jiang et al. Sok: Applying machine learning in security-a survey
Scaranti et al. Unsupervised online anomaly detection in Software Defined Network environments
Abirami et al. Building an ensemble learning based algorithm for improving intrusion detection system
Sovilj et al. A comparative evaluation of unsupervised deep architectures for intrusion detection in sequential data streams
Kosamkar et al. Improved Intrusion detection system using C4. 5 decision tree and support vector machine
Al-Utaibi et al. Intrusion detection taxonomy and data preprocessing mechanisms
Bhuyan et al. Network traffic anomaly detection techniques and systems
Mahboubi et al. Evolving techniques in cyber threat hunting: A systematic review
Razak A study on IDS for preventing Denial of Service attack using outliers techniques
Naz et al. Ensemble learning-based IDS for sensors telemetry data in IoT networks
Kheddar et al. Deep transfer learning applications in intrusion detection systems: A comprehensive review
Soliman et al. Rank: Ai-assisted end-to-end architecture for detecting persistent attacks in enterprise networks
Ravi et al. A robust intrusion detection system using machine learning techniques for MANET
Rani et al. Analysis of machine learning and deep learning intrusion detection system in Internet of Things network