Zarai et al., 2020 - Google Patents
Recurrent neural networks & deep neural networks based on intrusion detection systemZarai et al., 2020
View HTML- Document ID
- 16998341364435049689
- Author
- Zarai R
- et al.
- Publication year
- Publication venue
- Open Access Library Journal
External Links
Snippet
The computer security has become a major challenge. Tools and mechanisms have been developed to ensure a level of compliance. These include the Intrusion Detection Systems (IDS). The principle of conventional IDS is to detect attempts to attack a network and to …
- 238000001514 detection method 0 title abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/08—Learning methods
- G06N3/082—Learning methods modifying the architecture, e.g. adding or deleting nodes or connections, pruning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kotenko et al. | Systematic literature review of security event correlation methods | |
Süzen | Developing a multi-level intrusion detection system using hybrid-DBN | |
Zhou et al. | Vulnerability analysis of smart contract for blockchain-based IoT applications: A machine learning approach | |
Zarai | Recurrent neural networks & deep neural networks based on intrusion detection system | |
Al-Ambusaidi et al. | ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications | |
Nagaraja et al. | UTTAMA: an intrusion detection system based on feature clustering and feature transformation | |
Muslihi et al. | Detecting SQL injection on web application using deep learning techniques: a systematic literature review | |
Li et al. | Research on Multi‐Target Network Security Assessment with Attack Graph Expert System Model | |
Wu et al. | [Retracted] Research on Network Security Situational Awareness Based on Crawler Algorithm | |
Dou et al. | Pc 2 a: predicting collective contextual anomalies via lstm with deep generative model | |
Torre et al. | Deep learning techniques to detect cybersecurity attacks: a systematic mapping study | |
Barik et al. | Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network | |
Berdibayev et al. | A concept of the architecture and creation for siem system in critical infrastructure | |
Taher et al. | A novel tunicate swarm algorithm with hybrid deep learning enabled attack detection for secure iot environment | |
Ramadevi et al. | Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems. | |
Ryu et al. | Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning | |
Rajabi et al. | An intrusion detection system using the artificial neural network-based approach and firefly algorithm | |
Ma et al. | The construction method of computer network security defense system based on multisource big data | |
Varastan et al. | Hardening of the Internet of Things by using an intrusion detection system based on deep learning | |
Čisar et al. | Machine Learning Aspects of Internet Firewall Data | |
Kishore et al. | Evaluation of deep neural networks for advanced intrusion detection systems | |
Aswanandini et al. | Hyper-heuristic firefly algorithm based convolutional neural networks for big data cyber security | |
Alheeti et al. | Increasing the rate of intrusion detection based on a hybrid technique | |
Xu et al. | [Retracted] IoT‐Oriented Distributed Intrusion Detection Methods Using Intelligent Classification Algorithms in Spark | |
Tang et al. | AIGCN: Attack Intention Detection for Power System Using Graph Convolutional Networks |