[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xue, 2022 - Google Patents

Research on network security intrusion detection with an extreme learning machine algorithm

Xue, 2022

View PDF
Document ID
13728814274488419523
Author
Xue Y
Publication year
Publication venue
International Journal of Network Security

External Links

Snippet

With the rapid development of the Internet and the expansion of its application, network security is becoming more critical, especially the defense of network intrusion. This paper briefly introduced the network intrusion detection and extreme learning machine (ELM) …
Continue reading at ijns.jalaxy.com.tw (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0472Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • G06K9/627Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
    • G06K9/6271Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns based on distances to prototypes

Similar Documents

Publication Publication Date Title
Liu et al. An intrusion detection model with hierarchical attention mechanism
Peng et al. Network intrusion detection based on deep learning
Chen et al. ADASYN− Random forest based intrusion detection model
CN112492059A (en) DGA domain name detection model training method, DGA domain name detection device and storage medium
Liu et al. Mltracer: Malicious logins detection system via graph neural network
Muslihi et al. Detecting SQL injection on web application using deep learning techniques: a systematic literature review
Nuo A novel selection method of network intrusion optimal route detection based on naive Bayesian
Liu et al. Intrusion detection based on IDBM
Xue Research on network security intrusion detection with an extreme learning machine algorithm
Chen et al. An efficient network intrusion detection model based on temporal convolutional networks
Wang et al. An evolutionary computation-based machine learning for network attack detection in big data traffic
Dharaneish et al. Comparative analysis of deep learning and machine learning models for network intrusion detection
CN115473748B (en) DDoS attack classification detection method, device and equipment based on BiLSTM-ELM
CN112613032A (en) Host intrusion detection method and device based on system call sequence
Nazarudeen et al. Efficient DDoS Attack Detection using Machine Learning Techniques
Sanmorino et al. DDoS attacks detection method using feature importance and support vector machine
Ruijuan et al. User abnormal behavior analysis based on neural network clustering
Yu et al. A High-Performance Multimodal Deep Learning Model for Detecting Minority Class Sample Attacks
Wang et al. Detection of network intrusion threat based on the probabilistic neural network model
Li et al. An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data
Meng et al. Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling
Gambo et al. Hybrid approach for intrusion detection model using combination of k-means clustering algorithm and random forest classification
CN107809430B (en) Network intrusion detection method based on extreme point classification
Siyi Research on Web Intrusion Technology Based on DBN
Liu et al. Research on abnormal traffic detection of Internet of Things based on feature selection