Nothing Special   »   [go: up one dir, main page]

Yilmaz, 2022 - Google Patents

Intrusion detection in computer networks using optimized machine learning algorithms

Yilmaz, 2022

Document ID
10462754191392902008
Author
Yilmaz A
Publication year
Publication venue
2022 3rd International Informatics and Software Engineering Conference (IISEC)

External Links

Snippet

Intrusion detection systems (IDSs) are employed to maintain computer networks from cyber attacks. Here, the aim is to detect intrusions once the data is transmitted across the internet. Intrusion detection methods (IDMs) developed in the literature are commonly focused on …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Similar Documents

Publication Publication Date Title
Masdari et al. A survey and taxonomy of the fuzzy signature-based intrusion detection systems
Logeswari et al. An intrusion detection system for sdn using machine learning
Mhamdi et al. A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs
Ludwig Applying a neural network ensemble to intrusion detection
Peddabachigari et al. Modeling intrusion detection system using hybrid intelligent systems
Haq et al. Development of PCCNN-based network intrusion detection system for EDGE computing.
Rahman et al. Attacks classification in adaptive intrusion detection using decision tree
Golmah An efficient hybrid intrusion detection system based on C5. 0 and SVM
Aleroud et al. Contextual information fusion for intrusion detection: a survey and taxonomy
Subaira et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey
Ghosh et al. Proposed GA-BFSS and logistic regression based intrusion detection system
Yilmaz Intrusion detection in computer networks using optimized machine learning algorithms
Haque et al. Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms
Ghosh et al. An efficient hybrid multilevel intrusion detection system in cloud environment
Sakr et al. Filter versus wrapper feature selection for network intrusion detection system
Moorthy et al. A study of Intrusion Detection using data mining
Alaba et al. An ensemble of classification techniques for intrusion detection systems
Hussain et al. An NIDS for Known and Zero-Day Anomalies
Babouche et al. An adaptive attack prediction framework in cyber-physical systems
Hoque et al. An alert analysis approach to DDoS attack detection
Vilakazi et al. Application of feature selection and fuzzy ARTMAP to intrusion detection
Udayakumar et al. Machine Learning Based Intrusion Detection System
Gaikwad et al. One versus all classification in network intrusion detection using decision tree
Bisen et al. An intrusion detection system based on support vector machine using hierarchical clustering and genetic algorithm
Das et al. Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation