Nothing Special   »   [go: up one dir, main page]

Ambalavanan et al., 2020 - Google Patents

Cyber threats detection and mitigation using machine learning

Ambalavanan et al., 2020

View PDF
Document ID
6108255689356566462
Author
Ambalavanan V
et al.
Publication year
Publication venue
Handbook of research on machine and deep learning applications for cyber security

External Links

Snippet

Cyberspace plays a dominant role in the world of electronic communication. It is a virtual space where the interconnecting network has an independent technology infrastructure. The internet is the baseline for the cyberspace which can be openly accessible. Cyber-security is …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US11171974B2 (en) Distributed agent based model for security monitoring and response
Ambalavanan Cyber threats detection and mitigation using machine learning
Hababeh et al. An integrated methodology for big data classification and security for improving cloud systems data mobility
Peddabachigari et al. Intrusion detection systems using decision trees and support vector machines
Yu et al. Intrusion detection: a machine learning approach
Zaid et al. Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers
Lackner et al. Cybersecurity management for (industrial) internet of things–challenges and opportunities
Behiry et al. Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods
Moskal et al. Cyberattack action-intent-framework for mapping intrusion observables
Bin Ahmad et al. Using genetic algorithm to minimize false alarms in insider threats detection of information misuse in windows environment
Shrivastava et al. Preventing data tampering in IoT networks
US20230252138A1 (en) Cybersecurity workflow management using autodetection
Veena et al. An advanced intrusion detection solution for networks based on Honeypot servers
Ghadge Enhancing threat detection in Identity and Access Management (IAM) systems
Thangavel et al. Review on machine and deep learning applications for cyber security
Arora et al. Securing cloud data exchange related to IoT devices: key challenges and its machine learning solutions
Aswathy et al. Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future
Nallakaruppan et al. Enhancing Security of Host-based Intrusion Detection Systems for the Internet of Things
Kumari et al. SmRM: Ensemble Learning Devised Solution for Smart Riskware Management in Android Machines
Anand Intrusion detection: Tools, techniques and strategies
Mynuddin et al. Cyber Security System Using Fuzzy Logic
Egerton et al. Applying zero trust security principles to defence mechanisms against data exfiltration attacks
Erokhin Artificial intelligence for information security
Aswathy et al. 10 Privacy Breaches
Karasaridis et al. Artificial intelligence for cybersecurity