Al-Ghuwairi et al., 2023 - Google Patents
Intrusion detection in cloud computing based on time series anomalies utilizing machine learningAl-Ghuwairi et al., 2023
View HTML- Document ID
- 11799255555734045072
- Author
- Al-Ghuwairi A
- Sharrab Y
- Al-Fraihat D
- AlElaimat M
- Alsarhan A
- Algarni A
- Publication year
- Publication venue
- Journal of Cloud Computing
External Links
Snippet
The growth of cloud computing is hindered by concerns about privacy and security. Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent. Furthermore, few studies have approached the intrusion …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Ghuwairi et al. | Intrusion detection in cloud computing based on time series anomalies utilizing machine learning | |
Wang et al. | Anomaly detection for industrial control system based on autoencoder neural network | |
Landauer et al. | Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection | |
Rehman et al. | Evaluation of artificial intelligent techniques to secure information in enterprises | |
JP7302019B2 (en) | Hierarchical Behavior Modeling and Detection Systems and Methods for System-Level Security | |
D’angelo et al. | An uncertainty-managing batch relevance-based approach to network anomaly detection | |
Aminanto et al. | Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis | |
Mohammed et al. | Intrusion detection system based on SVM for WLAN | |
Du et al. | Digital Forensics as Advanced Ransomware Pre‐Attack Detection Algorithm for Endpoint Data Protection | |
Levshun et al. | A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities | |
Sahar et al. | Deep learning approach-based network intrusion detection system for fog-assisted iot | |
Landauer et al. | Time series analysis: unsupervised anomaly detection beyond outlier detection | |
Wang et al. | Heterogeneous graph matching networks: Application to unknown malware detection | |
Al-Utaibi et al. | Intrusion detection taxonomy and data preprocessing mechanisms | |
Sarkar et al. | Mining user interaction patterns in the darkweb to predict enterprise cyber incidents | |
Marchetti et al. | Identification of correlated network intrusion alerts | |
Nguyen et al. | Nested one-class support vector machines for network intrusion detection | |
Yu Beng et al. | A survey of intrusion alert correlation and its design considerations | |
Bebortta et al. | An opportunistic ensemble learning framework for network traffic classification in iot environments | |
Dib et al. | Machine learning-based ransomware classification of Bitcoin transactions | |
Wang et al. | Deep learning-based anomaly detection and log analysis for computer networks | |
Elbez et al. | Detection of DoS attacks using ARFIMA modeling of GOOSE communication in IEC 61850 substations | |
Yang et al. | Novel correlation analysis of alarms based on block matching similarities | |
Saheed et al. | ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems | |
Wali et al. | Anomaly Detection in Fog Computing: State-of-the-Art Techniques, applications, Challenges, and Future Directions |