Bao et al., 2009 - Google Patents
Network intrusion detection based on support vector machineBao et al., 2009
View PDF- Document ID
- 3412674308133091969
- Author
- Bao X
- Xu T
- Hou H
- Publication year
- Publication venue
- 2009 International Conference on Management and Service Science
External Links
Snippet
Network intrusion detection system is a significant guarantee means for network security. However, the current network intrusion detection system generally suffers from less prior knowledge which then leads to poor generalizing ability. Network intrusion detection system …
- 238000001514 detection method 0 title abstract description 66
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11336669B2 (en) | Artificial intelligence cyber security analyst | |
Azam et al. | Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree | |
EP2040435B1 (en) | Intrusion detection method and system | |
Shirazi et al. | Evaluation of anomaly detection techniques for scada communication resilience | |
CN116781430B (en) | Network information security system and method for gas pipe network | |
Yeruva et al. | Anomaly Detection System using ML Classification Algorithm for Network Security | |
Dubey et al. | KBB: A hybrid method for intrusion detection | |
CN113904881B (en) | Intrusion detection rule false alarm processing method and device | |
Ghosh et al. | An efficient hybrid multilevel intrusion detection system in cloud environment | |
Bao et al. | Network intrusion detection based on support vector machine | |
Khonde et al. | Hybrid Architecture for Distributed Intrusion Detection System. | |
Singh et al. | A hybrid approach for intrusion detection based on machine learning | |
Mohammad et al. | A novel local network intrusion detection system based on support vector machine | |
Dsouza et al. | Real Time Network Intrusion Detection using Machine Learning Technique | |
Tamy et al. | Select the best machine learning algorithms for prediction and classification of intrusions using kdd99 intrusion detection dataset | |
Liao et al. | Research on network intrusion detection method based on deep learning algorithm | |
Gopalan | Towards Effective Detection of Botnet Attacks Using BoT-IoT Dataset | |
Nguyen et al. | An active distributed approach for cyber attack detection | |
Alshehri | Relational Deep Learning Detection with Multi-Sequence Representation for Insider Threats | |
Baravati et al. | A new data mining-based approach to improving the quality of alerts in intrusion detection systems | |
Arshad et al. | Comparative Study of Machine Learning Techniques for Intrusion Detection on CICIDS-2017 Dataset | |
Dai | Research on network intrusion detection security based on improved extreme learning algorithms and neural network algorithms | |
Oluwakemi et al. | Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection | |
Srivastav et al. | Evaluation of network intrusion detection system using PCA and NBA | |
Selvakani et al. | Improving ID performance using GA and NN |