[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Al-mamory et al., 2015 - Google Patents

On the designing of two grains levels network intrusion detection system

Al-mamory et al., 2015

View HTML
Document ID
1352084938254090383
Author
Al-mamory S
Jassim F
Publication year
Publication venue
Karbala International Journal of Modern Science

External Links

Snippet

Despite the rapid progress of the information technology, protecting computers and networks remain a major problem for most authors. In this paper, two grains levels intrusion detection system (IDS) is suggested (fine-grained and coarse-grained). In normal case, where …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data

Similar Documents

Publication Publication Date Title
Mighan et al. A novel scalable intrusion detection system based on deep learning
Al-mamory et al. On the designing of two grains levels network intrusion detection system
Koc et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
Om et al. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system
Rehman et al. Evaluation of artificial intelligent techniques to secure information in enterprises
Jia et al. A DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning
Ugochukwu et al. An intrusion detection system using machine learning algorithm
Rani et al. Design of an intrusion detection model for IoT-enabled smart home
Mohammadpour et al. A mean convolutional layer for intrusion detection system
Gavel et al. Maximum correlation based mutual information scheme for intrusion detection in the data networks
Ramana et al. Ambient intelligence approach: Internet of Things based decision performance analysis for intrusion detection
Almarshdi et al. Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification.
Latif et al. EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud‐Assisted Wireless Body Area Network
Yassin et al. Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
Mughaid et al. Utilizing machine learning algorithms for effectively detection iot ddos attacks
Bebortta et al. An opportunistic ensemble learning framework for network traffic classification in iot environments
Kumar et al. Nature-inspired intrusion detection system for protecting software-defined networks controller
Bhati et al. An ensemble model for network intrusion detection using adaboost, random forest and logistic regression
Zwane et al. Ensemble learning approach for flow-based intrusion detection system
US20230344842A1 (en) Detection of user anomalies for software as a service application traffic with high and low variance feature modeling
Wu et al. An active learning framework using deep Q-network for zero-day attack detection
Vamsi Krishna et al. A Detailed Analysis of the CIDDS-001 and CICIDS-2017 Datasets
Alhasan et al. A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection.
Krsteski et al. Intrusion detection with supervised and unsupervised learning using pycaret over cicids 2017 dataset
Behjat et al. Feature subset selection using binary gravitational search algorithm for intrusion detection system