Movatterモバイル変換


[0]ホーム

URL:


Khan, 2009 - Google Patents

Anomaly detection in data streams using fuzzy logic

Khan, 2009

Document ID
14814209764903541138
Author
Khan M
Publication year
Publication venue
2009 International Conference on Information and Communication Technologies

External Links

Snippet

Unsupervised data mining techniques require human intervention for understanding and analysis of the clustering results. This becomes an issue in dynamic users/applications and there is a need for real-time decision making and interpretation. In this paper we will present …
Continue reading atieeexplore.ieee.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

PublicationPublication DateTitle
US10938845B2 (en)Detection of user behavior deviation from defined user groups
Boukhtouta et al.Network malware classification comparison using DPI and flow packet headers
Catak et al.Distributed denial of service attack detection using autoencoder and deep neural networks
Gogoi et al.MLH-IDS: a multi-level hybrid intrusion detection method
US7690037B1 (en)Filtering training data for machine learning
US8682812B1 (en)Machine learning based botnet detection using real-time extracted traffic features
Tahseen et al.Extraction for Big Data Cyber Security Analytics
Sharma et al.An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification
MinAn analysis of K-means algorithm based network intrusion detection system
CN109344913B (en)Network intrusion behavior detection method based on improved MajorCluster clustering
Yehezkel et al.Network anomaly detection using transfer learning based on auto-encoders loss normalization
US11140123B2 (en)Community detection based on DNS querying patterns
US20250063064A1 (en)Detecting Malicious Email Campaigns with Unique but Similarly-Spelled Attachments
Fallahi et al.Automated flow-based rule generation for network intrusion detection systems
Kozik et al.Cost‐Sensitive Distributed Machine Learning for NetFlow‐Based Botnet Activity Detection
Niandong et al.Detection of probe flow anomalies using information entropy and random forest method
Choi et al.An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring
Zwane et al.Ensemble learning approach for flow-based intrusion detection system
Liu et al.Doc2vec-based insider threat detection through behaviour analysis of multi-source security logs
Rajeswari et al.An active rule approach for network intrusion detection with enhanced C4. 5 algorithm
Rejimol Robinson et al.Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms
Hubballi et al.Layered higher order n-grams for hardening payload based anomaly intrusion detection
Ji et al.Feature driven learning framework for cybersecurity event detection
Komisarek et al.A novel, refined dataset for real-time Network Intrusion Detection
Sabri et al.Hybrid of rough set theory and artificial immune recognition system as a solution to decrease false alarm rate in intrusion detection system

[8]
ページ先頭

©2009-2025 Movatter.jp