Shi et al., 2018 - Google Patents
A framework of intrusion detection system based on Bayesian network in IoTShi et al., 2018
View PDF- Document ID
- 16133906200686713322
- Author
- Shi Q
- Kang J
- Wang R
- Yi H
- Lin Y
- Wang J
- Publication year
- Publication venue
- International Journal of Performability Engineering
External Links
Snippet
The increasing popularity of Internet of Things (IoT) technology has greatly influenced the production mode and life quality of humans. Simultaneously, the security issues of such technology have become a focus of attention. There are many aspects of IoT security issues …
- 238000001514 detection method 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lin | Deep learning for IoT | |
Li et al. | LNNLS‐KH: A Feature Selection Method for Network Intrusion Detection | |
Kotenko et al. | Systematic literature review of security event correlation methods | |
Haggag et al. | Implementing a deep learning model for intrusion detection on apache spark platform | |
Kostas | Anomaly detection in networks using machine learning | |
Kocher et al. | Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset | |
Nour et al. | A survey on threat hunting in enterprise networks | |
Shi et al. | A framework of intrusion detection system based on Bayesian network in IoT | |
Ghosh et al. | Proposed GA-BFSS and logistic regression based intrusion detection system | |
Adhao et al. | Feature selection using principal component analysis and genetic algorithm | |
Meng et al. | Semi-supervised anomaly detection in dynamic communication networks | |
Ahmad et al. | Role of machine learning and data mining in internet security: standing state with future directions | |
Kaiser et al. | Attack hypotheses generation based on threat intelligence knowledge graph | |
Yin et al. | Towards accurate intrusion detection based on improved clonal selection algorithm | |
Al-Utaibi et al. | Intrusion detection taxonomy and data preprocessing mechanisms | |
Luo et al. | A systematic literature review of intrusion detection systems in the cloud‐based IoT environments | |
Nathiya et al. | An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm | |
Alohali et al. | Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system | |
Almotairi et al. | Efficient Intrusion Detection using OptCNN-LSTM Model based on hybrid Correlation-based Feature Selection in IoMT. | |
Wang et al. | Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection | |
Zhao et al. | A situation awareness approach for network security using the fusion model | |
Hosseini et al. | A hybrid approach for anomaly detection in the Internet of Things | |
Rajabi et al. | An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm | |
Abhale et al. | Deep Learning Algorithmic Approach for Operational Anomaly Based Intrusion Detection System in Wireless Sensor Networks | |
Kumar et al. | Evaluation of machine learning algorithms for intrusion detection utilizing UNSW-NB15 dataset |