Sahani et al., 2018 - Google Patents
Classification of intrusion detection using data mining techniquesSahani et al., 2018
- Document ID
- 13378228729030881774
- Author
- Sahani R
- Shatabdinalini
- Rout C
- Chandrakanta Badajena J
- Jena A
- Das H
- Publication year
- Publication venue
- Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017
External Links
Snippet
Nowadays, Internet became a common way for communication as well as a key path for business. Due to the rapid use of Internet, its security aspect is turn more important day by day for which various network intrusion detection systems (NIDSs) are used to protect …
- 238000001514 detection method 0 title abstract description 39
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahani et al. | Classification of intrusion detection using data mining techniques | |
Talukder et al. | A dependable hybrid machine learning model for network intrusion detection | |
Kumar et al. | A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks | |
Aksu et al. | Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm | |
Khammassi et al. | A GA-LR wrapper approach for feature selection in network intrusion detection | |
Crespo-Martínez et al. | SQL injection attack detection in network flow data | |
Zhang et al. | A deep learning method to detect web attacks using a specially designed CNN | |
Elnakib et al. | EIDM: deep learning model for IoT intrusion detection systems | |
Shrivastava et al. | Attack detection and forensics using honeypot in IoT environment | |
Dey et al. | A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks | |
Gaber et al. | Industrial internet of things intrusion detection method using machine learning and optimization techniques | |
Seth et al. | MIDS: Metaheuristic based intrusion detection system for cloud using k-NN and MGWO | |
Thiyagarajan | A review on cyber security mechanisms using machine and deep learning algorithms | |
Monshizadeh et al. | Security related data mining | |
Azhagiri et al. | An intrusion detection system using ranked feature bagging | |
Brittorameshkumar | OSS-RF: Intrusion detection using optimized sine swarm based random forest classifier on unsw-nb15 dataset | |
Chaithanya et al. | An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique | |
Padmavathi et al. | An efficient botnet detection approach based on feature learning and classification | |
Kochhar et al. | Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks | |
Reyes-Dorta et al. | Detection of malicious URLs using machine learning | |
Farhat et al. | CADS-ML/DL: efficient cloud-based multi-attack detection system | |
Thomas et al. | Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment | |
Kozik et al. | Solution to data imbalance problem in application layer anomaly detection systems | |
Patil et al. | Learning to detect phishing web pages using lexical and string complexity analysis | |
Oha et al. | Machine learning models for malicious traffic detection in IoT networks/IoT-23 dataset |