[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ferrag et al., 2020 - Google Patents

Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks

Ferrag et al., 2020

View HTML
Document ID
18184556633963297447
Author
Ferrag M
Maglaras L
Ahmim A
Derdour M
Janicke H
Publication year
Publication venue
Future internet

External Links

Snippet

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of- Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Ferrag et al. Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks
Song et al. Analysis of autoencoders for network intrusion detection
Inayat et al. Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects
Balyan et al. A hybrid intrusion detection model using ega-pso and improved random forest method
Aldhaheri et al. DeepDCA: novel network-based detection of IoT attacks using artificial immune system
Albulayhi et al. IoT intrusion detection using machine learning with a novel high performing feature selection method
Abu Al-Haija et al. ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks
Chaganti et al. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things
Abu Al-Haija et al. Machine-learning-based darknet traffic detection system for IoT applications
Qazi et al. A one-dimensional convolutional neural network (1D-CNN) based deep learning system for network intrusion detection
Thapa et al. Comparison of machine learning and deep learning models for network intrusion detection systems
Iwendi et al. Security of things intrusion detection system for smart healthcare
Saghezchi et al. Machine learning for DDoS attack detection in industry 4.0 CPPSs
Fotiadou et al. Network traffic anomaly detection via deep learning
Ashraf et al. A deep learning-based smart framework for cyber-physical and satellite system security threats detection
Adefemi Alimi et al. Refined LSTM based intrusion detection for denial-of-service attack in Internet of Things
Xiao et al. An intrusion detection system based on a simplified residual network
Alabsi et al. CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks
Alsulami et al. An intrusion detection and classification system for IoT traffic with improved data engineering
Al-Sarem et al. An aggregated mutual information based feature selection with machine learning methods for enhancing IoT botnet attack detection
A. Reyes et al. A machine learning based two-stage Wi-Fi network intrusion detection system
Wang et al. Securing a smart home with a transformer-based iot intrusion detection system
Sun et al. Borderline smote algorithm and feature selection-based network anomalies detection strategy
Alkahtani et al. Developing cybersecurity systems based on machine learning and deep learning algorithms for protecting food security systems: industrial control systems
Shieh et al. Detection of unknown ddos attack using convolutional neural networks featuring geometrical metric