[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Abu Al‐Haija et al., 2022 - Google Patents

Boost‐Defence for resilient IoT networks: A head‐to‐toe approach

Abu Al‐Haija et al., 2022

Document ID
3273086176120142904
Author
Abu Al‐Haija Q
Al Badawi A
Bojja G
Publication year
Publication venue
Expert Systems

External Links

Snippet

Abstract The Internet of Things (IoT) is an emerging technology that is considered a key enabler for next‐generation smart cities, industries, security services and economies. IoT networks allow connected devices to communicate with each other automatically without …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Abu Al‐Haija et al. Boost‐Defence for resilient IoT networks: A head‐to‐toe approach
Mijwil et al. The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review
Alferaidi et al. Distributed Deep CNN‐LSTM Model for Intrusion Detection Method in IoT‐Based Vehicles
Myneni et al. DAPT 2020-constructing a benchmark dataset for advanced persistent threats
Nuaimi et al. Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
Shareena et al. Intrusion detection system for iot botnet attacks using deep learning
Janeja Data analytics for cybersecurity
Elnakib et al. EIDM: Deep learning model for IoT intrusion detection systems
Yue et al. Deep Learning‐Based Security Behaviour Analysis in IoT Environments: A Survey
Hammad et al. T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
Yi et al. A deep and systematic review of the intrusion detection systems in the fog environment
Luo et al. A systematic literature review of intrusion detection systems in the cloud‐based IoT environments
Harahsheh et al. A survey of using machine learning in IoT security and the challenges faced by researchers
Hulayyil et al. Machine-learning-based vulnerability detection and classification in internet of things device security
Shirvanian et al. Internet of Things data management: A systematic literature review, vision, and future trends
Rajawat et al. Analysis assaulting pattern for the security problem monitoring in 5G‐enabled sensor network systems with big data environment using artificial intelligence/machine learning
Gouda et al. Optimizing anomaly-based attack detection using classification machine learning
Bhavsar et al. Intrusion-based attack detection using machine learning techniques for connected autonomous vehicle
Ryu et al. Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning
Nalinipriya et al. Ransomware recognition in blockchain network using water moth flame optimization‐aware DRNN
Saied et al. A comparative analysis of using ensemble trees for botnet detection and classification in IoT
Jan et al. Effective intrusion detection in IoT environment: deep learning approach
Swessi et al. Comparative study of ensemble learning techniques for fuzzy attack detection in in-vehicle networks
Shafiq et al. Analyzing IoT attack feature association with threat actors
Talal et al. MADS based on DL techniques on the Internet of Things (IoT): Survey