Wehbi, 2022 - Google Patents
Machine learning based practical and efficient DDoS attacks detection system for IoTWehbi, 2022
- Document ID
- 9879588217405986974
- Author
- Wehbi K
- Publication year
External Links
Snippet
Abstract The increasing Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) is leading to the need for an efficient detection system. Although much research has been conducted to detect DDoS attacks on traditional networks, such as machine …
- 238000001514 detection method 0 title abstract description 174
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lakkaraju et al. | " How do I fool you?" Manipulating User Trust via Misleading Black Box Explanations | |
Charmet et al. | Explainable artificial intelligence for cybersecurity: a literature survey | |
Qolomany et al. | Trust-based cloud machine learning model selection for industrial IoT and smart city services | |
Usmani et al. | A review of unsupervised machine learning frameworks for anomaly detection in industrial applications | |
Alqudhaibi et al. | Predicting cybersecurity threats in critical infrastructure for industry 4.0: a proactive approach based on attacker motivations | |
Abid et al. | Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques | |
Moskalenko et al. | Resilience and resilient systems of artificial intelligence: taxonomy, models and methods | |
Tang et al. | Deep learning-based solution for smart contract vulnerabilities detection | |
Kumar et al. | Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities | |
Al-Imran et al. | Network intrusion detection: an analytical assessment using deep learning and state-of-the-art machine learning models | |
Nanjappan et al. | DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments | |
Chakraborty et al. | Deep learning for situational understanding | |
Wang et al. | DTITD: an intelligent insider threat detection framework based on digital twin and self-attention based deep learning models | |
Selim et al. | An efficient machine learning model for malicious activities recognition in water‐based industrial internet of things | |
Moon et al. | Study on machine learning techniques for malware classification and detection | |
Vidhya et al. | Quality challenges in deep learning data collection in perspective of artificial intelligence | |
Mosqueira-Rey et al. | Addressing the data bottleneck in medical deep learning models using a human-in-the-loop machine learning approach | |
Adhikari et al. | Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives | |
Narayanan et al. | Different analytical techniques for big data analysis: A review | |
Wehbi | Machine learning based practical and efficient DDoS attacks detection system for IoT | |
Efiong et al. | CyberSCADA network security analysis model for intrusion detection systems in the smart grid | |
Sharma et al. | IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions | |
US11811797B2 (en) | Machine learning methods and systems for developing security governance recommendations | |
Rajagopal et al. | Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0 | |
Wang | Cyber digital twin with deep learning model for enterprise products management |