Nothing Special   »   [go: up one dir, main page]

Qin et al., 2023 - Google Patents

A Hybrid SVM Based Real-Time Attack Classification Method for Cyber Network

Qin et al., 2023

Document ID
16723612044754452829
Author
Qin X
Jin F
Han Z
Zhao J
Wang W
Publication year
Publication venue
2023 42nd Chinese Control Conference (CCC)

External Links

Snippet

The cyber network attacks on the Internet have the characteristics of diversity, uncertainty and real-time. This paper proposes a hybrid support vector machine (HSVM)-based classification method for real-time cyber network attack detection. In the supervised …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Gao et al. A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network
Karatas et al. Deep learning in intrusion detection systems
Belouch et al. A two-stage classifier approach using reptree algorithm for network intrusion detection
Sharma et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification
Peng et al. Network intrusion detection based on deep learning
CN107395590A (en) A kind of intrusion detection method classified based on PCA and random forest
Pattawaro et al. Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique
Dubey et al. KBB: A hybrid method for intrusion detection
Liu et al. Mltracer: Malicious logins detection system via graph neural network
Aljanabi et al. Intrusion detection: A review
Shrivastava et al. Effective anomaly based intrusion detection using rough set theory and support vector machine
Saheed et al. An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system
Upendran et al. Optimization based classification technique for intrusion detection system
Somwang et al. Computer network security based on support vector machine approach
CN113420802A (en) Alarm data fusion method based on improved spectral clustering
Nathiya et al. An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm
Rahim et al. Analysis of IDS using feature selection approach on NSL-KDD dataset
Mohd et al. Anomaly-based NIDS: A review of machine learning methods on malware detection
Upadhyaya et al. Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification
Gangwar et al. A survey on anomaly and signature based intrusion detection system (IDS)
Gosu et al. A hybrid approach for the analysis of feature selection using information gain and BAT techniques on the anomaly detection
Gautam et al. Anomaly detection system using entropy based technique
Giacinto et al. Network intrusion detection by combining one-class classifiers
Qin et al. A Hybrid SVM Based Real-Time Attack Classification Method for Cyber Network
Kosamkar et al. Data Mining Algorithms for Intrusion Detection System: An Overview