Alzaqebah et al., 2022 - Google Patents
A modified grey wolf optimization algorithm for an intrusion detection systemAlzaqebah et al., 2022
View HTML- Document ID
- 13667508786528734682
- Author
- Alzaqebah A
- Aljarah I
- Al-Kadi O
- Damaševičius R
- Publication year
- Publication venue
- Mathematics
External Links
Snippet
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service's availability and consumers' privacy. A network Intrusion Detection System (IDS) aims to …
- 238000004422 calculation algorithm 0 title abstract description 64
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
- G06F19/28—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for programming tools or database systems, e.g. ontologies, heterogeneous data integration, data warehousing or computing architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alzaqebah et al. | A modified grey wolf optimization algorithm for an intrusion detection system | |
Abdullahi et al. | Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review | |
Awan et al. | Real-time DDoS attack detection system using big data approach | |
Kareem et al. | An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection | |
Quintero-Bonilla et al. | A new proposal on the advanced persistent threat: A survey | |
Alharbi et al. | Botnet attack detection using local global best bat algorithm for industrial internet of things | |
Soe et al. | Machine learning-based IoT-botnet attack detection with sequential architecture | |
Ali et al. | Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT) | |
Aldhaheri et al. | Deepdca: novel network-based detection of iot attacks using artificial immune system | |
Truong et al. | Artificial intelligence in the cyber domain: Offense and defense | |
Khare et al. | Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection | |
Sudqi Khater et al. | A lightweight perceptron-based intrusion detection system for fog computing | |
Mahfouz et al. | Ensemble classifiers for network intrusion detection using a novel network attack dataset | |
Alkahtani et al. | Artificial intelligence algorithms for malware detection in android-operated mobile devices | |
Apostol et al. | IoT botnet anomaly detection using unsupervised deep learning | |
Wang et al. | Network anomaly intrusion detection based on deep learning approach | |
Papadopoulos et al. | Launching adversarial attacks against network intrusion detection systems for iot | |
Ashraf et al. | A deep learning-based smart framework for cyber-physical and satellite system security threats detection | |
Rodríguez et al. | Transfer-learning-based intrusion detection framework in IoT networks | |
Qureshi et al. | RNN-ABC: A new swarm optimization based technique for anomaly detection | |
ElKashlan et al. | A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs) | |
Elsayed et al. | A hierarchical deep learning-based intrusion detection architecture for clustered internet of things | |
Alosaimi et al. | An intrusion detection system using BoT-IoT | |
Afrifa et al. | Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers | |
Popoola et al. | Memory-efficient deep learning for botnet attack detection in IoT networks |