Nothing Special   »   [go: up one dir, main page]

Alzaqebah et al., 2022 - Google Patents

A modified grey wolf optimization algorithm for an intrusion detection system

Alzaqebah et al., 2022

View HTML
Document ID
13667508786528734682
Author
Alzaqebah A
Aljarah I
Al-Kadi O
Damaševičius R
Publication year
Publication venue
Mathematics

External Links

Snippet

Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service's availability and consumers' privacy. A network Intrusion Detection System (IDS) aims to …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • G06F19/28Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for programming tools or database systems, e.g. ontologies, heterogeneous data integration, data warehousing or computing architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Alzaqebah et al. A modified grey wolf optimization algorithm for an intrusion detection system
Abdullahi et al. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
Awan et al. Real-time DDoS attack detection system using big data approach
Kareem et al. An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection
Quintero-Bonilla et al. A new proposal on the advanced persistent threat: A survey
Alharbi et al. Botnet attack detection using local global best bat algorithm for industrial internet of things
Soe et al. Machine learning-based IoT-botnet attack detection with sequential architecture
Ali et al. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT)
Aldhaheri et al. Deepdca: novel network-based detection of iot attacks using artificial immune system
Truong et al. Artificial intelligence in the cyber domain: Offense and defense
Khare et al. Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection
Sudqi Khater et al. A lightweight perceptron-based intrusion detection system for fog computing
Mahfouz et al. Ensemble classifiers for network intrusion detection using a novel network attack dataset
Alkahtani et al. Artificial intelligence algorithms for malware detection in android-operated mobile devices
Apostol et al. IoT botnet anomaly detection using unsupervised deep learning
Wang et al. Network anomaly intrusion detection based on deep learning approach
Papadopoulos et al. Launching adversarial attacks against network intrusion detection systems for iot
Ashraf et al. A deep learning-based smart framework for cyber-physical and satellite system security threats detection
Rodríguez et al. Transfer-learning-based intrusion detection framework in IoT networks
Qureshi et al. RNN-ABC: A new swarm optimization based technique for anomaly detection
ElKashlan et al. A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs)
Elsayed et al. A hierarchical deep learning-based intrusion detection architecture for clustered internet of things
Alosaimi et al. An intrusion detection system using BoT-IoT
Afrifa et al. Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers
Popoola et al. Memory-efficient deep learning for botnet attack detection in IoT networks