[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shi et al., 2018 - Google Patents

A framework of intrusion detection system based on Bayesian network in IoT

Shi et al., 2018

View PDF
Document ID
16133906200686713322
Author
Shi Q
Kang J
Wang R
Yi H
Lin Y
Wang J
Publication year
Publication venue
International Journal of Performability Engineering

External Links

Snippet

The increasing popularity of Internet of Things (IoT) technology has greatly influenced the production mode and life quality of humans. Simultaneously, the security issues of such technology have become a focus of attention. There are many aspects of IoT security issues …
Continue reading at www.ijpe-online.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Lin Deep learning for IoT
Li et al. LNNLS‐KH: A Feature Selection Method for Network Intrusion Detection
Kotenko et al. Systematic literature review of security event correlation methods
Haggag et al. Implementing a deep learning model for intrusion detection on apache spark platform
Kostas Anomaly detection in networks using machine learning
Kocher et al. Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset
Nour et al. A survey on threat hunting in enterprise networks
Shi et al. A framework of intrusion detection system based on Bayesian network in IoT
Ghosh et al. Proposed GA-BFSS and logistic regression based intrusion detection system
Adhao et al. Feature selection using principal component analysis and genetic algorithm
Meng et al. Semi-supervised anomaly detection in dynamic communication networks
Ahmad et al. Role of machine learning and data mining in internet security: standing state with future directions
Kaiser et al. Attack hypotheses generation based on threat intelligence knowledge graph
Yin et al. Towards accurate intrusion detection based on improved clonal selection algorithm
Al-Utaibi et al. Intrusion detection taxonomy and data preprocessing mechanisms
Luo et al. A systematic literature review of intrusion detection systems in the cloud‐based IoT environments
Nathiya et al. An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm
Alohali et al. Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system
Almotairi et al. Efficient Intrusion Detection using OptCNN-LSTM Model based on hybrid Correlation-based Feature Selection in IoMT.
Wang et al. Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection
Zhao et al. A situation awareness approach for network security using the fusion model
Hosseini et al. A hybrid approach for anomaly detection in the Internet of Things
Rajabi et al. An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm
Abhale et al. Deep Learning Algorithmic Approach for Operational Anomaly Based Intrusion Detection System in Wireless Sensor Networks
Kumar et al. Evaluation of machine learning algorithms for intrusion detection utilizing UNSW-NB15 dataset