Priya et al., 2022 - Google Patents
Network Attack Detection using Machine LearningPriya et al., 2022
- Document ID
- 7248314738546904268
- Author
- Priya N
- Meyyappan S
- Balasubramanian K
- Pruthiev A
- Publication year
- Publication venue
- 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)
External Links
Snippet
Network attack detection system is utilized to find the anomalies with the aim of finding hackers before they make immense damage to our system. Nowadays business environments need high level security because there are a lot of transactions happening in …
- 238000001514 detection method 0 title abstract description 36
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12047396B2 (en) | System and method for monitoring security attack chains | |
US11463457B2 (en) | Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance | |
US11562064B2 (en) | Machine learning-based security alert escalation guidance | |
Navaz et al. | Entropy based anomaly detection system to prevent DDoS attacks in cloud | |
Siadati et al. | Detecting structurally anomalous logins within enterprise networks | |
Hoque et al. | An implementation of intrusion detection system using genetic algorithm | |
KR101689295B1 (en) | Automated verification method of security event and automated verification apparatus of security event | |
CN114679338A (en) | Network risk assessment method based on network security situation awareness | |
Balkanli et al. | Feature selection for robust backscatter DDoS detection | |
Xuan et al. | A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic | |
CN111786966A (en) | Method and device for browsing webpage | |
Krishnaveni et al. | Ensemble approach for network threat detection and classification on cloud computing | |
US20150172302A1 (en) | Interface for analysis of malicious activity on a network | |
Sabri et al. | Identifying false alarm rates for intrusion detection system with data mining | |
Gomes et al. | Cryingjackpot: Network flows and performance counters against cryptojacking | |
Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
Fernando et al. | Enhancing intrusion detection in iot communications through ml model generalization with a new dataset (idsai) | |
Noor et al. | An intelligent context-aware threat detection and response model for smart cyber-physical systems | |
Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
Rawajbeh et al. | A new model for security analysis of network anomalies for IoT devices | |
Priya et al. | Network Attack Detection using Machine Learning | |
Leghris et al. | Improved security intrusion detection using intelligent techniques | |
Abirami et al. | Proactive network packet classification using artificial intelligence | |
Huang | Application of computer data mining technology based on AKN algorithm in denial of service attack defense detection | |
Naaz et al. | Enhancement of network security through intrusion detection |