Qin et al., 2023 - Google Patents
A Hybrid SVM Based Real-Time Attack Classification Method for Cyber NetworkQin et al., 2023
- Document ID
- 16723612044754452829
- Author
- Qin X
- Jin F
- Han Z
- Zhao J
- Wang W
- Publication year
- Publication venue
- 2023 42nd Chinese Control Conference (CCC)
External Links
Snippet
The cyber network attacks on the Internet have the characteristics of diversity, uncertainty and real-time. This paper proposes a hybrid support vector machine (HSVM)-based classification method for real-time cyber network attack detection. In the supervised …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network | |
Karatas et al. | Deep learning in intrusion detection systems | |
Belouch et al. | A two-stage classifier approach using reptree algorithm for network intrusion detection | |
Sharma et al. | An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification | |
Peng et al. | Network intrusion detection based on deep learning | |
CN107395590A (en) | A kind of intrusion detection method classified based on PCA and random forest | |
Pattawaro et al. | Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique | |
Dubey et al. | KBB: A hybrid method for intrusion detection | |
Liu et al. | Mltracer: Malicious logins detection system via graph neural network | |
Aljanabi et al. | Intrusion detection: A review | |
Shrivastava et al. | Effective anomaly based intrusion detection using rough set theory and support vector machine | |
Saheed et al. | An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system | |
Upendran et al. | Optimization based classification technique for intrusion detection system | |
Somwang et al. | Computer network security based on support vector machine approach | |
CN113420802A (en) | Alarm data fusion method based on improved spectral clustering | |
Nathiya et al. | An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm | |
Rahim et al. | Analysis of IDS using feature selection approach on NSL-KDD dataset | |
Mohd et al. | Anomaly-based NIDS: A review of machine learning methods on malware detection | |
Upadhyaya et al. | Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification | |
Gangwar et al. | A survey on anomaly and signature based intrusion detection system (IDS) | |
Gosu et al. | A hybrid approach for the analysis of feature selection using information gain and BAT techniques on the anomaly detection | |
Gautam et al. | Anomaly detection system using entropy based technique | |
Giacinto et al. | Network intrusion detection by combining one-class classifiers | |
Qin et al. | A Hybrid SVM Based Real-Time Attack Classification Method for Cyber Network | |
Kosamkar et al. | Data Mining Algorithms for Intrusion Detection System: An Overview |