Nothing Special   »   [go: up one dir, main page]

Qin et al., 2023 - Google Patents

A Hybrid SVM Based Real-Time Attack Classification Method for Cyber Network

Qin et al., 2023

Document ID
16723612044754452829
Author
Qin X
Jin F
Han Z
Zhao J
Wang W
Publication year
Publication venue
2023 42nd Chinese Control Conference (CCC)

External Links

Snippet

The cyber network attacks on the Internet have the characteristics of diversity, uncertainty and real-time. This paper proposes a hybrid support vector machine (HSVM)-based classification method for real-time cyber network attack detection. In the supervised …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Gao et al. A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network
Karatas et al. Deep learning in intrusion detection systems
Sharma et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification
Peng et al. Network intrusion detection based on deep learning
Upendran et al. Optimization based classification technique for intrusion detection system
Pattawaro et al. Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique
Dubey et al. KBB: A hybrid method for intrusion detection
Aljanabi et al. Intrusion Detection: A Review
Somwang et al. Computer network security based on support vector machine approach
Saheed et al. An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system
Liu et al. Mltracer: Malicious logins detection system via graph neural network
Mohd et al. Anomaly-based nids: A review of machine learning methods on malware detection
Gangwar et al. A survey on anomaly and signature based intrusion detection system (IDS)
Nathiya et al. An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm
Rahim et al. Analysis of IDS using feature selection approach on NSL-KDD dataset
Sellappan et al. Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system
Gosu et al. A hybrid approach for the analysis of feature selection using information gain and BAT techniques on the anomaly detection
Gautam et al. Anomaly detection system using entropy based technique
Kosamkar et al. Data Mining Algorithms for Intrusion Detection System: An Overview
Liao et al. Research on network intrusion detection method based on deep learning algorithm
Giacinto et al. Network intrusion detection by combining one-class classifiers
Sulaiman et al. Big data analytic of intrusion detection system
Sharma et al. Recent trend in Intrusion detection using Fuzzy-Genetic algorithm
Boonyopakorn The optimization and enhancement of network intrusion detection through fuzzy association rules
Qin et al. A Hybrid SVM Based Real-Time Attack Classification Method for Cyber Network