Yilmaz, 2022 - Google Patents
Intrusion detection in computer networks using optimized machine learning algorithmsYilmaz, 2022
- Document ID
- 10462754191392902008
- Author
- Yilmaz A
- Publication year
- Publication venue
- 2022 3rd International Informatics and Software Engineering Conference (IISEC)
External Links
Snippet
Intrusion detection systems (IDSs) are employed to maintain computer networks from cyber attacks. Here, the aim is to detect intrusions once the data is transmitted across the internet. Intrusion detection methods (IDMs) developed in the literature are commonly focused on …
- 238000001514 detection method 0 title abstract description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Masdari et al. | A survey and taxonomy of the fuzzy signature-based intrusion detection systems | |
Logeswari et al. | An intrusion detection system for sdn using machine learning | |
Mhamdi et al. | A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs | |
Ludwig | Applying a neural network ensemble to intrusion detection | |
Peddabachigari et al. | Modeling intrusion detection system using hybrid intelligent systems | |
Haq et al. | Development of PCCNN-based network intrusion detection system for EDGE computing. | |
Rahman et al. | Attacks classification in adaptive intrusion detection using decision tree | |
Golmah | An efficient hybrid intrusion detection system based on C5. 0 and SVM | |
Aleroud et al. | Contextual information fusion for intrusion detection: a survey and taxonomy | |
Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey | |
Ghosh et al. | Proposed GA-BFSS and logistic regression based intrusion detection system | |
Yilmaz | Intrusion detection in computer networks using optimized machine learning algorithms | |
Haque et al. | Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms | |
Ghosh et al. | An efficient hybrid multilevel intrusion detection system in cloud environment | |
Sakr et al. | Filter versus wrapper feature selection for network intrusion detection system | |
Moorthy et al. | A study of Intrusion Detection using data mining | |
Alaba et al. | An ensemble of classification techniques for intrusion detection systems | |
Hussain et al. | An NIDS for Known and Zero-Day Anomalies | |
Babouche et al. | An adaptive attack prediction framework in cyber-physical systems | |
Hoque et al. | An alert analysis approach to DDoS attack detection | |
Vilakazi et al. | Application of feature selection and fuzzy ARTMAP to intrusion detection | |
Udayakumar et al. | Machine Learning Based Intrusion Detection System | |
Gaikwad et al. | One versus all classification in network intrusion detection using decision tree | |
Bisen et al. | An intrusion detection system based on support vector machine using hierarchical clustering and genetic algorithm | |
Das et al. | Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation |