Movatterモバイル変換


[0]ホーム

URL:


Yan et al., 2020 - Google Patents

Trustworthy network anomaly detection based on an adaptive learning rate and momentum in IIoT

Yan et al., 2020

Document ID
12939679131501055685
Author
Yan X
Xu Y
Xing X
Cui B
Guo Z
Guo T
Publication year
Publication venue
IEEE Transactions on Industrial Informatics

External Links

Snippet

While the industrial Internet of Things (IIoT) brings convenience to the industry, it also brings security problems. Due to the massive amount of data generated by the surge of IIoT devices, it is impossible to ensure whether these data contain an attack or untrustworthy …
Continue reading atieeexplore.ieee.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

PublicationPublication DateTitle
Yan et al.Trustworthy network anomaly detection based on an adaptive learning rate and momentum in IIoT
Sun et al.DL‐IDS: Extracting Features Using CNN‐LSTM Hybrid Network for Intrusion Detection System
Injadat et al.Multi-stage optimized machine learning framework for network intrusion detection
Haggag et al.Implementing a deep learning model for intrusion detection on apache spark platform
Bodström et al.State of the art literature review on network anomaly detection with deep learning
Kanimozhi et al.Oppositional tunicate fuzzy C‐means algorithm and logistic regression for intrusion detection on cloud
Maseer et al.Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Lan et al.E‐minBatch GraphSAGE: An Industrial Internet Attack Detection Model
Chou et al.Data-driven network intrusion detection: A taxonomy of challenges and methods
Abusnaina et al.Subgraph-based adversarial examples against graph-based IoT malware detection systems
PandeyDesign and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system
Gu et al.Learning-based intrusion detection for high-dimensional imbalanced traffic
Pardhi et al.Classification of malware from the network traffic using hybrid and deep learning based approach
Naif AlatawiEnhancing intrusion detection systems with advanced machine learning techniques: An ensemble and explainable artificial intelligence (AI) approach
Logeswari et al.A comprehensive approach to intrusion detection in IoT environments using hybrid feature selection and multi-stage classification techniques
Pourardebil Khah et al.A hybrid machine learning approach for feature selection in designing intrusion detection systems (IDS) model for distributed computing networks
Chou et al.Classification of malicious traffic using tensorflow machine learning
Zheng et al.Fed-UGI: Federated undersampling learning framework with Gini impurity for imbalanced network intrusion detection
KaranamIs there a Trojan!: Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments
Wang et al.Deep learning network intrusion detection based on network traffic
Senthilkumar et al.An Efficient Investigation of Cloud Computing Security with Machine Learning Algorithm
Soni et al.Optimized Deep Learning-Based Intrusion Detection and Secure, Energy-Efficient Routing in Wireless Sensor Networks
Trifonov et al.Adaptive Optimization Techniques for Inteligent Network Security
Sama et al.Enhancing system security by intrusion detection using deep learning
Hossen et al.Traffic Classification For Botnet Detection Using Deep Learning

[8]
ページ先頭

©2009-2025 Movatter.jp