[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shrivastava et al., 2013 - Google Patents

A review of intrusion detection technique by soft computing and data mining approach

Shrivastava et al., 2013

Document ID
3793120223667930806
Author
Shrivastava A
Baghel M
Gupta H
Publication year
Publication venue
International Journal of Advanced Computer Research

External Links

Snippet

The growth of the Internet spreads a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Jose et al. A survey on anomaly based host intrusion detection system
Rahman et al. Adaptive intrusion detection based on boosting and naïve Bayesian classifier
Peddabachigari et al. Intrusion detection systems using decision trees and support vector machines
Sharma et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification
Ashraf et al. A comparative study of data mining algorithms for high detection rate in intrusion detection system
Azad et al. Data mining in intrusion detection: a comparative study of methods, types and data sets
Chandra et al. Filter-based attribute selection approach for intrusion detection using k-means clustering and sequential minimal optimization techniq
Lin et al. A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques
Chaudhari et al. Intrusion detection system: classification, techniques and datasets to implement
Farid et al. Adaptive network intrusion detection learning: attribute selection and classification
Neethu Adaptive intrusion detection using machine learning
Islam et al. Real-time detection schemes for memory DoS (M-DoS) attacks on cloud computing applications
Shrivastava et al. A review of intrusion detection technique by soft computing and data mining approach
AlEroud et al. Beyond data: Contextual information fusion for cyber security analytics
Kang et al. Actdetector: A sequence-based framework for network attack activity detection
Kumar et al. Intrusion detection using artificial neural network with reduced input features
Shrivastava et al. A novel hybrid feature selection and intrusion detection based on PCNN and support vector machine
Ali et al. Securing cloud environments: a Convolutional Neural Network (CNN) approach to intrusion detection system
Rathore et al. Intrusion detection system on KDDCup99 dataset: a survey
Chaimaa et al. Intrusion detection system with grey wolf optimizer (GWO)
Ranjithkumar et al. Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML.
Nkikabahizi et al. Classification and analysis of techniques applied in intrusion detection systems
Farid et al. Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection
Mittal et al. Hybrid Machine Learning based Intrusion Detection System for IoT
Obimbo et al. Comparison of SVMs with radial-basis function & polynomial kernels in classification of categories in intrusion detection