Tasnim et al., 2022 - Google Patents
Classification And Explanation of Different Internet of Things (IoT) Network Attacks Using Machine Learning, Deep Learning And XAITasnim et al., 2022
View PDF- Document ID
- 15214909596746335074
- Author
- Tasnim A
- Hossain N
- Tabassum S
- Parvin N
- Publication year
External Links
Snippet
The internet of things is one of today's most revolutionary technologies. Because of its pervasiveness, increasing network connection capacity, and diversity of linked items, the internet of things (IoT) is adaptable and versatile. The most common problem impeding IoT …
- 238000010801 machine learning 0 title abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/627—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/6269—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on the distance between the decision surface and training patterns lying on the boundary of the class cluster, e.g. support vector machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30153—Redundancy elimination performed by the file system using compression, e.g. sparse files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharma et al. | Anomaly based network intrusion detection for IoT attacks using deep learning technique | |
Bharati et al. | Machine and deep learning for iot security and privacy: applications, challenges, and future directions | |
Shrivastava et al. | Attack detection and forensics using honeypot in IoT environment | |
US20200244673A1 (en) | Multivariate network structure anomaly detector | |
Jullian et al. | Deep-learning based detection for cyber-attacks in iot networks: A distributed attack detection framework | |
Nandanwar et al. | Deep learning enabled intrusion detection system for Industrial IOT environment | |
Rana et al. | Intrusion detection systems in cloud computing paradigm: analysis and overview | |
Arora et al. | Evaluation of machine learning algorithms used on attacks detection in industrial control systems | |
Javed et al. | APT adversarial defence mechanism for industrial IoT enabled cyber-physical system | |
Sarwar et al. | IoT network anomaly detection in smart homes using machine learning | |
Boahen et al. | A deep learning approach to online social network account compromisation | |
Barik et al. | Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network | |
Sahingoz et al. | Internet of Things (IoTs) security: Intrusion detection using deep learning | |
Potula et al. | Artificial intelligence-based cyber security applications | |
Kandasamy et al. | Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks | |
Ryu et al. | Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning | |
Best et al. | Utilising k-means clustering and naive bayes for IoT anomaly detection: A hybrid approach | |
Abdelbasit | Cybersecurity attacks detection for MQTT-IoT networks using machine learning ensemble techniques | |
Tasnim et al. | Classification And Explanation of Different Internet of Things (IoT) Network Attacks Using Machine Learning, Deep Learning And XAI | |
Thanthrige | Hidden markov model based intrusion alert prediction | |
Arjunan | Fraud Detection in NoSQL Database Systems using Advanced Machine Learning | |
Al-Shurbaji et al. | Deep Learning-Based Intrusion Detection System For Detecting IoT Botnet Attacks: A Review | |
Wardana et al. | Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network | |
Hendaoui et al. | Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review | |
Esmaeili et al. | Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security |