Shrivastava et al., 2013 - Google Patents
A review of intrusion detection technique by soft computing and data mining approachShrivastava et al., 2013
- Document ID
- 3793120223667930806
- Author
- Shrivastava A
- Baghel M
- Gupta H
- Publication year
- Publication venue
- International Journal of Advanced Computer Research
External Links
Snippet
The growth of the Internet spreads a large amount of data communication. The communication of data compromised network threats and security issues. The network threats and security issues raised a problem of data integrity and loss of data. For the …
- 238000001514 detection method 0 title abstract description 78
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jose et al. | A survey on anomaly based host intrusion detection system | |
Rahman et al. | Adaptive intrusion detection based on boosting and naïve Bayesian classifier | |
Peddabachigari et al. | Intrusion detection systems using decision trees and support vector machines | |
Sharma et al. | An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification | |
Ashraf et al. | A comparative study of data mining algorithms for high detection rate in intrusion detection system | |
Azad et al. | Data mining in intrusion detection: a comparative study of methods, types and data sets | |
Chandra et al. | Filter-based attribute selection approach for intrusion detection using k-means clustering and sequential minimal optimization techniq | |
Lin et al. | A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques | |
Chaudhari et al. | Intrusion detection system: classification, techniques and datasets to implement | |
Farid et al. | Adaptive network intrusion detection learning: attribute selection and classification | |
Neethu | Adaptive intrusion detection using machine learning | |
Islam et al. | Real-time detection schemes for memory DoS (M-DoS) attacks on cloud computing applications | |
Shrivastava et al. | A review of intrusion detection technique by soft computing and data mining approach | |
AlEroud et al. | Beyond data: Contextual information fusion for cyber security analytics | |
Kang et al. | Actdetector: A sequence-based framework for network attack activity detection | |
Kumar et al. | Intrusion detection using artificial neural network with reduced input features | |
Shrivastava et al. | A novel hybrid feature selection and intrusion detection based on PCNN and support vector machine | |
Ali et al. | Securing cloud environments: a Convolutional Neural Network (CNN) approach to intrusion detection system | |
Rathore et al. | Intrusion detection system on KDDCup99 dataset: a survey | |
Chaimaa et al. | Intrusion detection system with grey wolf optimizer (GWO) | |
Ranjithkumar et al. | Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML. | |
Nkikabahizi et al. | Classification and analysis of techniques applied in intrusion detection systems | |
Farid et al. | Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection | |
Mittal et al. | Hybrid Machine Learning based Intrusion Detection System for IoT | |
Obimbo et al. | Comparison of SVMs with radial-basis function & polynomial kernels in classification of categories in intrusion detection |