Qin et al., 2023 - Google Patents
A Hybrid SVM Based Real-Time Attack Classification Method for Cyber NetworkQin et al., 2023
- Document ID
- 16723612044754452829
- Author
- Qin X
- Jin F
- Han Z
- Zhao J
- Wang W
- Publication year
- Publication venue
- 2023 42nd Chinese Control Conference (CCC)
External Links
Snippet
The cyber network attacks on the Internet have the characteristics of diversity, uncertainty and real-time. This paper proposes a hybrid support vector machine (HSVM)-based classification method for real-time cyber network attack detection. In the supervised …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network | |
Karatas et al. | Deep learning in intrusion detection systems | |
Sharma et al. | An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification | |
Peng et al. | Network intrusion detection based on deep learning | |
Upendran et al. | Optimization based classification technique for intrusion detection system | |
Pattawaro et al. | Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique | |
Dubey et al. | KBB: A hybrid method for intrusion detection | |
Aljanabi et al. | Intrusion Detection: A Review | |
Somwang et al. | Computer network security based on support vector machine approach | |
Saheed et al. | An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system | |
Liu et al. | Mltracer: Malicious logins detection system via graph neural network | |
Mohd et al. | Anomaly-based nids: A review of machine learning methods on malware detection | |
Gangwar et al. | A survey on anomaly and signature based intrusion detection system (IDS) | |
Nathiya et al. | An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm | |
Rahim et al. | Analysis of IDS using feature selection approach on NSL-KDD dataset | |
Sellappan et al. | Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system | |
Gosu et al. | A hybrid approach for the analysis of feature selection using information gain and BAT techniques on the anomaly detection | |
Gautam et al. | Anomaly detection system using entropy based technique | |
Kosamkar et al. | Data Mining Algorithms for Intrusion Detection System: An Overview | |
Liao et al. | Research on network intrusion detection method based on deep learning algorithm | |
Giacinto et al. | Network intrusion detection by combining one-class classifiers | |
Sulaiman et al. | Big data analytic of intrusion detection system | |
Sharma et al. | Recent trend in Intrusion detection using Fuzzy-Genetic algorithm | |
Boonyopakorn | The optimization and enhancement of network intrusion detection through fuzzy association rules | |
Qin et al. | A Hybrid SVM Based Real-Time Attack Classification Method for Cyber Network |