Al-mamory et al., 2015 - Google Patents
On the designing of two grains levels network intrusion detection systemAl-mamory et al., 2015
View HTML- Document ID
- 1352084938254090383
- Author
- Al-mamory S
- Jassim F
- Publication year
- Publication venue
- Karbala International Journal of Modern Science
External Links
Snippet
Despite the rapid progress of the information technology, protecting computers and networks remain a major problem for most authors. In this paper, two grains levels intrusion detection system (IDS) is suggested (fine-grained and coarse-grained). In normal case, where …
- 238000001514 detection method 0 title abstract description 64
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mighan et al. | A novel scalable intrusion detection system based on deep learning | |
Al-mamory et al. | On the designing of two grains levels network intrusion detection system | |
Koc et al. | A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier | |
Om et al. | A hybrid system for reducing the false alarm rate of anomaly intrusion detection system | |
Rehman et al. | Evaluation of artificial intelligent techniques to secure information in enterprises | |
Jia et al. | A DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning | |
Ugochukwu et al. | An intrusion detection system using machine learning algorithm | |
Rani et al. | Design of an intrusion detection model for IoT-enabled smart home | |
Mohammadpour et al. | A mean convolutional layer for intrusion detection system | |
Gavel et al. | Maximum correlation based mutual information scheme for intrusion detection in the data networks | |
Ramana et al. | Ambient intelligence approach: Internet of Things based decision performance analysis for intrusion detection | |
Almarshdi et al. | Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification. | |
Latif et al. | EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud‐Assisted Wireless Body Area Network | |
Yassin et al. | Signature-Based Anomaly intrusion detection using Integrated data mining classifiers | |
Mughaid et al. | Utilizing machine learning algorithms for effectively detection iot ddos attacks | |
Bebortta et al. | An opportunistic ensemble learning framework for network traffic classification in iot environments | |
Kumar et al. | Nature-inspired intrusion detection system for protecting software-defined networks controller | |
Bhati et al. | An ensemble model for network intrusion detection using adaboost, random forest and logistic regression | |
Zwane et al. | Ensemble learning approach for flow-based intrusion detection system | |
US20230344842A1 (en) | Detection of user anomalies for software as a service application traffic with high and low variance feature modeling | |
Wu et al. | An active learning framework using deep Q-network for zero-day attack detection | |
Vamsi Krishna et al. | A Detailed Analysis of the CIDDS-001 and CICIDS-2017 Datasets | |
Alhasan et al. | A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection. | |
Krsteski et al. | Intrusion detection with supervised and unsupervised learning using pycaret over cicids 2017 dataset | |
Behjat et al. | Feature subset selection using binary gravitational search algorithm for intrusion detection system |