Nothing Special   »   [go: up one dir, main page]

Priya et al., 2022 - Google Patents

Network Attack Detection using Machine Learning

Priya et al., 2022

Document ID
7248314738546904268
Author
Priya N
Meyyappan S
Balasubramanian K
Pruthiev A
Publication year
Publication venue
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)

External Links

Snippet

Network attack detection system is utilized to find the anomalies with the aim of finding hackers before they make immense damage to our system. Nowadays business environments need high level security because there are a lot of transactions happening in …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
US12047396B2 (en) System and method for monitoring security attack chains
US11463457B2 (en) Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance
US11562064B2 (en) Machine learning-based security alert escalation guidance
Navaz et al. Entropy based anomaly detection system to prevent DDoS attacks in cloud
Siadati et al. Detecting structurally anomalous logins within enterprise networks
Hoque et al. An implementation of intrusion detection system using genetic algorithm
KR101689295B1 (en) Automated verification method of security event and automated verification apparatus of security event
CN114679338A (en) Network risk assessment method based on network security situation awareness
Balkanli et al. Feature selection for robust backscatter DDoS detection
Xuan et al. A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic
CN111786966A (en) Method and device for browsing webpage
Krishnaveni et al. Ensemble approach for network threat detection and classification on cloud computing
US20150172302A1 (en) Interface for analysis of malicious activity on a network
Sabri et al. Identifying false alarm rates for intrusion detection system with data mining
Gomes et al. Cryingjackpot: Network flows and performance counters against cryptojacking
Mangrulkar et al. Network attacks and their detection mechanisms: A review
Fernando et al. Enhancing intrusion detection in iot communications through ml model generalization with a new dataset (idsai)
Noor et al. An intelligent context-aware threat detection and response model for smart cyber-physical systems
Lah et al. Proposed framework for network lateral movement detection based on user risk scoring in siem
Rawajbeh et al. A new model for security analysis of network anomalies for IoT devices
Priya et al. Network Attack Detection using Machine Learning
Leghris et al. Improved security intrusion detection using intelligent techniques
Abirami et al. Proactive network packet classification using artificial intelligence
Huang Application of computer data mining technology based on AKN algorithm in denial of service attack defense detection
Naaz et al. Enhancement of network security through intrusion detection