Ferrag et al., 2020 - Google Patents
Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networksFerrag et al., 2020
View HTML- Document ID
- 18184556633963297447
- Author
- Ferrag M
- Maglaras L
- Ahmim A
- Derdour M
- Janicke H
- Publication year
- Publication venue
- Future internet
External Links
Snippet
This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of- Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and …
- 238000001514 detection method 0 title abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrag et al. | Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks | |
Song et al. | Analysis of autoencoders for network intrusion detection | |
Inayat et al. | Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects | |
Balyan et al. | A hybrid intrusion detection model using ega-pso and improved random forest method | |
Aldhaheri et al. | DeepDCA: novel network-based detection of IoT attacks using artificial immune system | |
Albulayhi et al. | IoT intrusion detection using machine learning with a novel high performing feature selection method | |
Abu Al-Haija et al. | ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks | |
Chaganti et al. | A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things | |
Abu Al-Haija et al. | Machine-learning-based darknet traffic detection system for IoT applications | |
Qazi et al. | A one-dimensional convolutional neural network (1D-CNN) based deep learning system for network intrusion detection | |
Thapa et al. | Comparison of machine learning and deep learning models for network intrusion detection systems | |
Iwendi et al. | Security of things intrusion detection system for smart healthcare | |
Saghezchi et al. | Machine learning for DDoS attack detection in industry 4.0 CPPSs | |
Fotiadou et al. | Network traffic anomaly detection via deep learning | |
Ashraf et al. | A deep learning-based smart framework for cyber-physical and satellite system security threats detection | |
Adefemi Alimi et al. | Refined LSTM based intrusion detection for denial-of-service attack in Internet of Things | |
Xiao et al. | An intrusion detection system based on a simplified residual network | |
Alabsi et al. | CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks | |
Alsulami et al. | An intrusion detection and classification system for IoT traffic with improved data engineering | |
Al-Sarem et al. | An aggregated mutual information based feature selection with machine learning methods for enhancing IoT botnet attack detection | |
A. Reyes et al. | A machine learning based two-stage Wi-Fi network intrusion detection system | |
Wang et al. | Securing a smart home with a transformer-based iot intrusion detection system | |
Sun et al. | Borderline smote algorithm and feature selection-based network anomalies detection strategy | |
Alkahtani et al. | Developing cybersecurity systems based on machine learning and deep learning algorithms for protecting food security systems: industrial control systems | |
Shieh et al. | Detection of unknown ddos attack using convolutional neural networks featuring geometrical metric |