Nothing Special   »   [go: up one dir, main page]

Wehbi, 2022 - Google Patents

Machine learning based practical and efficient DDoS attacks detection system for IoT

Wehbi, 2022

Document ID
9879588217405986974
Author
Wehbi K
Publication year

External Links

Snippet

Abstract The increasing Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) is leading to the need for an efficient detection system. Although much research has been conducted to detect DDoS attacks on traditional networks, such as machine …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks

Similar Documents

Publication Publication Date Title
Lakkaraju et al. " How do I fool you?" Manipulating User Trust via Misleading Black Box Explanations
Charmet et al. Explainable artificial intelligence for cybersecurity: a literature survey
Qolomany et al. Trust-based cloud machine learning model selection for industrial IoT and smart city services
Usmani et al. A review of unsupervised machine learning frameworks for anomaly detection in industrial applications
Alqudhaibi et al. Predicting cybersecurity threats in critical infrastructure for industry 4.0: a proactive approach based on attacker motivations
Abid et al. Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
Moskalenko et al. Resilience and resilient systems of artificial intelligence: taxonomy, models and methods
Tang et al. Deep learning-based solution for smart contract vulnerabilities detection
Kumar et al. Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities
Al-Imran et al. Network intrusion detection: an analytical assessment using deep learning and state-of-the-art machine learning models
Nanjappan et al. DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
Chakraborty et al. Deep learning for situational understanding
Wang et al. DTITD: an intelligent insider threat detection framework based on digital twin and self-attention based deep learning models
Selim et al. An efficient machine learning model for malicious activities recognition in water‐based industrial internet of things
Moon et al. Study on machine learning techniques for malware classification and detection
Vidhya et al. Quality challenges in deep learning data collection in perspective of artificial intelligence
Mosqueira-Rey et al. Addressing the data bottleneck in medical deep learning models using a human-in-the-loop machine learning approach
Adhikari et al. Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
Narayanan et al. Different analytical techniques for big data analysis: A review
Wehbi Machine learning based practical and efficient DDoS attacks detection system for IoT
Efiong et al. CyberSCADA network security analysis model for intrusion detection systems in the smart grid
Sharma et al. IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions
US11811797B2 (en) Machine learning methods and systems for developing security governance recommendations
Rajagopal et al. Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0
Wang Cyber digital twin with deep learning model for enterprise products management