Nothing Special   »   [go: up one dir, main page]

Akintola, 2024 - Google Patents

Identifying Botnets within the Traffic Generated By a Network in Two Different Datasets

Akintola, 2024

View PDF
Document ID
1926226355552331172
Author
Akintola G
Publication year
Publication venue
Int. J. Sci. Res. in Computer Science and Engineering Vol

External Links

Snippet

The impact of cyber-attacks on organizational and private networks has been significant, causing extensive damage and posing serious threats to cybersecurity. This is largely due to the increasing sophistication of malicious hackers, making the detection and mitigation of …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Samy et al. Fog-based attack detection framework for internet of things using deep learning
Al Shorman et al. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection
Ge et al. Towards a deep learning-driven intrusion detection approach for Internet of Things
Keshk et al. An explainable deep learning-enabled intrusion detection framework in IoT networks
Al-Fawa'reh et al. Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior
Nuaimi et al. Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
Ortet Lopes et al. Towards effective detection of recent DDoS attacks: A deep learning approach
Mao et al. MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
Hammad et al. T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
Bodström et al. State of the art literature review on network anomaly detection with deep learning
Nandanwar et al. Deep learning enabled intrusion detection system for Industrial IOT environment
Farhan et al. Hybrid feature selection approach to improve the deep neural network on new flow-based dataset for NIDS
Altaf et al. NE-GConv: A lightweight node edge graph convolutional network for intrusion detection
Awad et al. Addressing imbalanced classes problem of intrusion detection system using weighted extreme learning machine
Malik et al. Securing the Internet of Things using machine learning: a review
Liu Computer network confidential information security based on big data clustering algorithm
Prabhakaran et al. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Parameswari et al. Hybrid rat swarm hunter prey optimization trained deep learning for network intrusion detection using CNN features
Djenouri et al. Interpretable intrusion detection for next generation of Internet of Things
Alzahrani et al. [Retracted] Computational Intelligence Approaches in Developing Cyberattack Detection System
Li et al. Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization
Jan et al. Effective intrusion detection in IoT environment: deep learning approach
Qu et al. Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Ramya et al. Integrating Quantum Computing and NLP for Advanced Cyber Threat Detection.
Shaohui et al. PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system