[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zarai et al., 2020 - Google Patents

Recurrent neural networks & deep neural networks based on intrusion detection system

Zarai et al., 2020

View HTML
Document ID
16998341364435049689
Author
Zarai R
et al.
Publication year
Publication venue
Open Access Library Journal

External Links

Snippet

The computer security has become a major challenge. Tools and mechanisms have been developed to ensure a level of compliance. These include the Intrusion Detection Systems (IDS). The principle of conventional IDS is to detect attempts to attack a network and to …
Continue reading at www.scirp.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/08Learning methods
    • G06N3/082Learning methods modifying the architecture, e.g. adding or deleting nodes or connections, pruning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation

Similar Documents

Publication Publication Date Title
Kotenko et al. Systematic literature review of security event correlation methods
Süzen Developing a multi-level intrusion detection system using hybrid-DBN
Zhou et al. Vulnerability analysis of smart contract for blockchain-based IoT applications: A machine learning approach
Zarai Recurrent neural networks & deep neural networks based on intrusion detection system
Al-Ambusaidi et al. ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications
Nagaraja et al. UTTAMA: an intrusion detection system based on feature clustering and feature transformation
Muslihi et al. Detecting SQL injection on web application using deep learning techniques: a systematic literature review
Li et al. Research on Multi‐Target Network Security Assessment with Attack Graph Expert System Model
Wu et al. [Retracted] Research on Network Security Situational Awareness Based on Crawler Algorithm
Dou et al. Pc 2 a: predicting collective contextual anomalies via lstm with deep generative model
Torre et al. Deep learning techniques to detect cybersecurity attacks: a systematic mapping study
Barik et al. Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Berdibayev et al. A concept of the architecture and creation for siem system in critical infrastructure
Taher et al. A novel tunicate swarm algorithm with hybrid deep learning enabled attack detection for secure iot environment
Ramadevi et al. Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems.
Ryu et al. Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning
Rajabi et al. An intrusion detection system using the artificial neural network-based approach and firefly algorithm
Ma et al. The construction method of computer network security defense system based on multisource big data
Varastan et al. Hardening of the Internet of Things by using an intrusion detection system based on deep learning
Čisar et al. Machine Learning Aspects of Internet Firewall Data
Kishore et al. Evaluation of deep neural networks for advanced intrusion detection systems
Aswanandini et al. Hyper-heuristic firefly algorithm based convolutional neural networks for big data cyber security
Alheeti et al. Increasing the rate of intrusion detection based on a hybrid technique
Xu et al. [Retracted] IoT‐Oriented Distributed Intrusion Detection Methods Using Intelligent Classification Algorithms in Spark
Tang et al. AIGCN: Attack Intention Detection for Power System Using Graph Convolutional Networks