[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wei et al., 2023 - Google Patents

Comparing malware attack detection using machine learning techniques in IoT network traffic

Wei et al., 2023

View PDF
Document ID
13627500780967431034
Author
Wei Y
Md-Arshad M
Samad A
Ithnin N
Publication year
Publication venue
International Journal of Innovative Computing

External Links

Snippet

Most IoT devices are designed and built for cheap and basic functions, therefore, the security aspects of these devices are not taken seriously. Yet, IoT devices tend to play an important role in this era, where the amount of IoT devices is predicted to exceed the number …
Continue reading at ijic.utm.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Ozkan-Okay et al. A comprehensive systematic literature review on intrusion detection systems
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Ghafir et al. Detection of advanced persistent threat using machine-learning correlation analysis
Oprea et al. Made: Security analytics for enterprise threat detection
US10855700B1 (en) Post-intrusion detection of cyber-attacks during lateral movement within networks
Hajj et al. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Pacheco et al. Anomaly behavior analysis for IoT sensors
Bhatt et al. Towards a framework to detect multi-stage advanced persistent threats attacks
Bijone A survey on secure network: intrusion detection & prevention approaches
Kirubavathi et al. Botnet detection via mining of traffic flow characteristics
JP2023524619A (en) Treat data flows differently based on interest
Al-Fawa'reh et al. Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior
Liao et al. Network forensics based on fuzzy logic and expert system
Revathi et al. A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework
Boero et al. Statistical fingerprint‐based intrusion detection system (SF‐IDS)
Hamed et al. A survey and taxonomy on data and pre-processing techniques of intrusion detection systems
Wei et al. Comparing malware attack detection using machine learning techniques in IoT network traffic
Fernando et al. Enhancing intrusion detection in iot communications through ml model generalization with a new dataset (idsai)
Mathew et al. An alert fusion framework for situation awareness of coordinated multistage attacks
Lah et al. Proposed framework for network lateral movement detection based on user risk scoring in siem
HosseiniNejad et al. A cyber kill chain based analysis of remote access trojans
Karande et al. Real-time detection of cyber attacks on the IoT devices
Abirami et al. Proactive network packet classification using artificial intelligence
Doukas et al. Review of artificial intelligence cyber threat assessment techniques for increased system survivability