Nothing Special   »   [go: up one dir, main page]

Bao et al., 2009 - Google Patents

Network intrusion detection based on support vector machine

Bao et al., 2009

View PDF
Document ID
3412674308133091969
Author
Bao X
Xu T
Hou H
Publication year
Publication venue
2009 International Conference on Management and Service Science

External Links

Snippet

Network intrusion detection system is a significant guarantee means for network security. However, the current network intrusion detection system generally suffers from less prior knowledge which then leads to poor generalizing ability. Network intrusion detection system …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
US11336669B2 (en) Artificial intelligence cyber security analyst
Azam et al. Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree
EP2040435B1 (en) Intrusion detection method and system
Shirazi et al. Evaluation of anomaly detection techniques for scada communication resilience
CN116781430B (en) Network information security system and method for gas pipe network
Yeruva et al. Anomaly Detection System using ML Classification Algorithm for Network Security
Dubey et al. KBB: A hybrid method for intrusion detection
CN113904881B (en) Intrusion detection rule false alarm processing method and device
Ghosh et al. An efficient hybrid multilevel intrusion detection system in cloud environment
Bao et al. Network intrusion detection based on support vector machine
Khonde et al. Hybrid Architecture for Distributed Intrusion Detection System.
Singh et al. A hybrid approach for intrusion detection based on machine learning
Mohammad et al. A novel local network intrusion detection system based on support vector machine
Dsouza et al. Real Time Network Intrusion Detection using Machine Learning Technique
Tamy et al. Select the best machine learning algorithms for prediction and classification of intrusions using kdd99 intrusion detection dataset
Liao et al. Research on network intrusion detection method based on deep learning algorithm
Gopalan Towards Effective Detection of Botnet Attacks Using BoT-IoT Dataset
Nguyen et al. An active distributed approach for cyber attack detection
Alshehri Relational Deep Learning Detection with Multi-Sequence Representation for Insider Threats
Baravati et al. A new data mining-based approach to improving the quality of alerts in intrusion detection systems
Arshad et al. Comparative Study of Machine Learning Techniques for Intrusion Detection on CICIDS-2017 Dataset
Dai Research on network intrusion detection security based on improved extreme learning algorithms and neural network algorithms
Oluwakemi et al. Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection
Srivastav et al. Evaluation of network intrusion detection system using PCA and NBA
Selvakani et al. Improving ID performance using GA and NN