Wei et al., 2023 - Google Patents
Comparing malware attack detection using machine learning techniques in IoT network trafficWei et al., 2023
View PDF- Document ID
- 13627500780967431034
- Author
- Wei Y
- Md-Arshad M
- Samad A
- Ithnin N
- Publication year
- Publication venue
- International Journal of Innovative Computing
External Links
Snippet
Most IoT devices are designed and built for cheap and basic functions, therefore, the security aspects of these devices are not taken seriously. Yet, IoT devices tend to play an important role in this era, where the amount of IoT devices is predicted to exceed the number …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
Ozkan-Okay et al. | A comprehensive systematic literature review on intrusion detection systems | |
Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
Ghafir et al. | Detection of advanced persistent threat using machine-learning correlation analysis | |
Oprea et al. | Made: Security analytics for enterprise threat detection | |
US10855700B1 (en) | Post-intrusion detection of cyber-attacks during lateral movement within networks | |
Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
Pacheco et al. | Anomaly behavior analysis for IoT sensors | |
Bhatt et al. | Towards a framework to detect multi-stage advanced persistent threats attacks | |
Bijone | A survey on secure network: intrusion detection & prevention approaches | |
Kirubavathi et al. | Botnet detection via mining of traffic flow characteristics | |
JP2023524619A (en) | Treat data flows differently based on interest | |
Al-Fawa'reh et al. | Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior | |
Liao et al. | Network forensics based on fuzzy logic and expert system | |
Revathi et al. | A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework | |
Boero et al. | Statistical fingerprint‐based intrusion detection system (SF‐IDS) | |
Hamed et al. | A survey and taxonomy on data and pre-processing techniques of intrusion detection systems | |
Wei et al. | Comparing malware attack detection using machine learning techniques in IoT network traffic | |
Fernando et al. | Enhancing intrusion detection in iot communications through ml model generalization with a new dataset (idsai) | |
Mathew et al. | An alert fusion framework for situation awareness of coordinated multistage attacks | |
Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
HosseiniNejad et al. | A cyber kill chain based analysis of remote access trojans | |
Karande et al. | Real-time detection of cyber attacks on the IoT devices | |
Abirami et al. | Proactive network packet classification using artificial intelligence | |
Doukas et al. | Review of artificial intelligence cyber threat assessment techniques for increased system survivability |