[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nalavade, 2020 - Google Patents

Using machine learning and statistical models for intrusion detection

Nalavade, 2020

View PDF
Document ID
13144135664229342178
Author
Nalavade K
Publication year
Publication venue
International Journal of Computer Applications

External Links

Snippet

Detecting intrusions and preventing the possible attacks is a critical aspect of computer based system security. Efforts have been made to achieve this goal such as firewalls, intrusion detection system, anti-virus, organizational security policies and many more. In this …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Kumar et al. Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks
Alqahtani et al. Cyber intrusion detection using machine learning classification techniques
Khraisat et al. Survey of intrusion detection systems: techniques, datasets and challenges
Ahmadian Ramaki et al. A systematic review on intrusion detection based on the Hidden Markov Model
Patcha et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends
Peddabachigari et al. Intrusion detection systems using decision trees and support vector machines
Rahman et al. Adaptive intrusion detection based on boosting and naïve Bayesian classifier
Subaira et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey
Pham et al. Machine learning techniques for web intrusion detection—a comparison
Liu et al. Mltracer: Malicious logins detection system via graph neural network
Razak A study on IDS for preventing Denial of Service attack using outliers techniques
Moorthy et al. A study of Intrusion Detection using data mining
Hussein Performance analysis of different machine learning models for intrusion detection systems
Soewu et al. Analysis of Data Mining-Based Approach for Intrusion Detection System
Andreas et al. Flow-based and packet-based intrusion detection using BLSTM
Nalavade Using machine learning and statistical models for intrusion detection
Jayasimhan et al. Anomaly detection using a clustering technique
Baklizi et al. Web Attack Intrusion Detection System Using Machine Learning Techniques.
Liu et al. A new approach of user-level intrusion detection with command sequence-to-sequence model
Duessel et al. Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces
Pao et al. Statistical learning methods for information security: fundamentals and case studies
Gurbani Kaur Classification of Intrusion using Artificial Neural Network with GWO
Leslie Using semi-supervised learning for flow-based network intrusion detection
Reddy et al. MLIDS: Revolutionizing of IoT based Digital Security Mechanism with Machine Learning Assisted Intrusion Detection System
Iradukunda et al. Multi-classifier deep neural network for detecting intruder behavior in cyber security