Ambalavanan et al., 2020 - Google Patents
Cyber threats detection and mitigation using machine learningAmbalavanan et al., 2020
View PDF- Document ID
- 6108255689356566462
- Author
- Ambalavanan V
- et al.
- Publication year
- Publication venue
- Handbook of research on machine and deep learning applications for cyber security
External Links
Snippet
Cyberspace plays a dominant role in the world of electronic communication. It is a virtual space where the interconnecting network has an independent technology infrastructure. The internet is the baseline for the cyberspace which can be openly accessible. Cyber-security is …
- 238000001514 detection method 0 title abstract description 74
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11171974B2 (en) | Distributed agent based model for security monitoring and response | |
Ambalavanan | Cyber threats detection and mitigation using machine learning | |
Hababeh et al. | An integrated methodology for big data classification and security for improving cloud systems data mobility | |
Peddabachigari et al. | Intrusion detection systems using decision trees and support vector machines | |
Yu et al. | Intrusion detection: a machine learning approach | |
Zaid et al. | Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers | |
Lackner et al. | Cybersecurity management for (industrial) internet of things–challenges and opportunities | |
Behiry et al. | Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods | |
Moskal et al. | Cyberattack action-intent-framework for mapping intrusion observables | |
Bin Ahmad et al. | Using genetic algorithm to minimize false alarms in insider threats detection of information misuse in windows environment | |
Shrivastava et al. | Preventing data tampering in IoT networks | |
US20230252138A1 (en) | Cybersecurity workflow management using autodetection | |
Veena et al. | An advanced intrusion detection solution for networks based on Honeypot servers | |
Ghadge | Enhancing threat detection in Identity and Access Management (IAM) systems | |
Thangavel et al. | Review on machine and deep learning applications for cyber security | |
Arora et al. | Securing cloud data exchange related to IoT devices: key challenges and its machine learning solutions | |
Aswathy et al. | Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future | |
Nallakaruppan et al. | Enhancing Security of Host-based Intrusion Detection Systems for the Internet of Things | |
Kumari et al. | SmRM: Ensemble Learning Devised Solution for Smart Riskware Management in Android Machines | |
Anand | Intrusion detection: Tools, techniques and strategies | |
Mynuddin et al. | Cyber Security System Using Fuzzy Logic | |
Egerton et al. | Applying zero trust security principles to defence mechanisms against data exfiltration attacks | |
Erokhin | Artificial intelligence for information security | |
Aswathy et al. | 10 Privacy Breaches | |
Karasaridis et al. | Artificial intelligence for cybersecurity |