Nalavade, 2020 - Google Patents
Using machine learning and statistical models for intrusion detectionNalavade, 2020
View PDF- Document ID
- 13144135664229342178
- Author
- Nalavade K
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
Detecting intrusions and preventing the possible attacks is a critical aspect of computer based system security. Efforts have been made to achieve this goal such as firewalls, intrusion detection system, anti-virus, organizational security policies and many more. In this …
- 238000001514 detection method 0 title abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks | |
Alqahtani et al. | Cyber intrusion detection using machine learning classification techniques | |
Khraisat et al. | Survey of intrusion detection systems: techniques, datasets and challenges | |
Ahmadian Ramaki et al. | A systematic review on intrusion detection based on the Hidden Markov Model | |
Patcha et al. | An overview of anomaly detection techniques: Existing solutions and latest technological trends | |
Peddabachigari et al. | Intrusion detection systems using decision trees and support vector machines | |
Rahman et al. | Adaptive intrusion detection based on boosting and naïve Bayesian classifier | |
Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey | |
Pham et al. | Machine learning techniques for web intrusion detection—a comparison | |
Liu et al. | Mltracer: Malicious logins detection system via graph neural network | |
Razak | A study on IDS for preventing Denial of Service attack using outliers techniques | |
Moorthy et al. | A study of Intrusion Detection using data mining | |
Hussein | Performance analysis of different machine learning models for intrusion detection systems | |
Soewu et al. | Analysis of Data Mining-Based Approach for Intrusion Detection System | |
Andreas et al. | Flow-based and packet-based intrusion detection using BLSTM | |
Nalavade | Using machine learning and statistical models for intrusion detection | |
Jayasimhan et al. | Anomaly detection using a clustering technique | |
Baklizi et al. | Web Attack Intrusion Detection System Using Machine Learning Techniques. | |
Liu et al. | A new approach of user-level intrusion detection with command sequence-to-sequence model | |
Duessel et al. | Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces | |
Pao et al. | Statistical learning methods for information security: fundamentals and case studies | |
Gurbani Kaur | Classification of Intrusion using Artificial Neural Network with GWO | |
Leslie | Using semi-supervised learning for flow-based network intrusion detection | |
Reddy et al. | MLIDS: Revolutionizing of IoT based Digital Security Mechanism with Machine Learning Assisted Intrusion Detection System | |
Iradukunda et al. | Multi-classifier deep neural network for detecting intruder behavior in cyber security |