Xue, 2022 - Google Patents
Research on network security intrusion detection with an extreme learning machine algorithmXue, 2022
View PDF- Document ID
- 13728814274488419523
- Author
- Xue Y
- Publication year
- Publication venue
- International Journal of Network Security
External Links
Snippet
With the rapid development of the Internet and the expansion of its application, network security is becoming more critical, especially the defense of network intrusion. This paper briefly introduced the network intrusion detection and extreme learning machine (ELM) …
- 238000001514 detection method 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
- G06N3/0472—Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/627—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
- G06K9/6271—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns based on distances to prototypes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | An intrusion detection model with hierarchical attention mechanism | |
Peng et al. | Network intrusion detection based on deep learning | |
Chen et al. | ADASYN− Random forest based intrusion detection model | |
CN112492059A (en) | DGA domain name detection model training method, DGA domain name detection device and storage medium | |
Liu et al. | Mltracer: Malicious logins detection system via graph neural network | |
Muslihi et al. | Detecting SQL injection on web application using deep learning techniques: a systematic literature review | |
Nuo | A novel selection method of network intrusion optimal route detection based on naive Bayesian | |
Liu et al. | Intrusion detection based on IDBM | |
Xue | Research on network security intrusion detection with an extreme learning machine algorithm | |
Chen et al. | An efficient network intrusion detection model based on temporal convolutional networks | |
Wang et al. | An evolutionary computation-based machine learning for network attack detection in big data traffic | |
Dharaneish et al. | Comparative analysis of deep learning and machine learning models for network intrusion detection | |
CN115473748B (en) | DDoS attack classification detection method, device and equipment based on BiLSTM-ELM | |
CN112613032A (en) | Host intrusion detection method and device based on system call sequence | |
Nazarudeen et al. | Efficient DDoS Attack Detection using Machine Learning Techniques | |
Sanmorino et al. | DDoS attacks detection method using feature importance and support vector machine | |
Ruijuan et al. | User abnormal behavior analysis based on neural network clustering | |
Yu et al. | A High-Performance Multimodal Deep Learning Model for Detecting Minority Class Sample Attacks | |
Wang et al. | Detection of network intrusion threat based on the probabilistic neural network model | |
Li et al. | An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data | |
Meng et al. | Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling | |
Gambo et al. | Hybrid approach for intrusion detection model using combination of k-means clustering algorithm and random forest classification | |
CN107809430B (en) | Network intrusion detection method based on extreme point classification | |
Siyi | Research on Web Intrusion Technology Based on DBN | |
Liu et al. | Research on abnormal traffic detection of Internet of Things based on feature selection |