Nothing Special   »   [go: up one dir, main page]

Kornyo et al., 2023 - Google Patents

Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms

Kornyo et al., 2023

Document ID
16419251236413830102
Author
Kornyo O
Asante M
Opoku R
Owusu-Agyemang K
Partey B
Baah E
Boadu N
Publication year
Publication venue
Computers & Security

External Links

Snippet

Abstract STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of privilege) in advance metering infrastructure (AMI) and cloud computing have been confronted with numerous botnet attacks within the IoT systems. Botmasters aid botnets in …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks

Similar Documents

Publication Publication Date Title
Aljawarneh et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
Karatas et al. Deep learning in intrusion detection systems
Maglaras et al. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Hossain et al. Ensuring network security with a robust intrusion detection system using ensemble-based machine learning
Haddadi et al. Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification
Paudel et al. Detecting dos attack in smart home iot devices using a graph-based approach
Liao et al. Network forensics based on fuzzy logic and expert system
Soe et al. Rule generation for signature based detection systems of cyber attacks in iot environments
Nookala Venu et al. Botnet attacks detection in internet of things using machine learning
Kornyo et al. Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms
Yeboah-Ofori et al. Malware attack predictive analytics in a cyber supply chain context using machine learning
Fallahi et al. Automated flow-based rule generation for network intrusion detection systems
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Salih et al. Implementation of hybrid artificial intelligence technique to detect covert channels attack in new generation internet protocol IPv6
Sugumaran et al. Cyber Defence Based on Artificial Intelligence and Neural Network Model in Cybersecurity
Alsumaidaie et al. An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks
Abdelhamid et al. A survey on learning-based intrusion detection systems for IoT networks
Wutyi et al. Heuristic rules for attack detection charged by NSL KDD dataset
Farid et al. Learning intrusion detection based on adaptive bayesian algorithm
Kumar et al. Intrusion detection using artificial neural network with reduced input features
Arqane et al. A review of intrusion detection systems: datasets and machine learning methods
Chen et al. Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier
Neil et al. Statistical detection of intruders within computer networks using scan statistics
Sapozhnikova et al. Intrusion detection system based on data mining technics for industrial networks
Manandhar A practical approach to anomaly-based intrusion detection system by outlier mining in network traffic