Movatterモバイル変換


[0]ホーム

URL:


Gao et al., 2019 - Google Patents

A novel intrusion detection system based on extreme machine learning and multi-voting technology

Gao et al., 2019

Document ID
17911188109100894158
Author
Gao J
Chai S
Zhang C
Zhang B
Cui L
Publication year
Publication venue
2019 Chinese Control Conference (CCC)

External Links

Snippet

With the fast development of networking technology, billions of devices have been developed with network function. When the scale of a network traffic grows by an order of magnitude, traditional intrusion detection system (IDS) are no longer effective to detect …
Continue reading atieeexplore.ieee.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

PublicationPublication DateTitle
Li et al.LSTM-BA: DDoS detection approach combining LSTM and Bayes
Atefi et al.Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network
Devi et al.A Review Paper on IDS in Edge Computing or EoT
Ullah et al.A filter-based feature selection model for anomaly-based intrusion detection systems
Ghosh et al.Proposed GA-BFSS and logistic regression based intrusion detection system
Sivanantham et al.Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network.
Alhayali et al.Optimized machine learning algorithm for intrusion detection
Gao et al.A novel intrusion detection system based on extreme machine learning and multi-voting technology
Gao et al.Anomaly traffic detection in IoT security using graph neural networks
Ghosh et al.An efficient hybrid multilevel intrusion detection system in cloud environment
SalamIntelligent system for IoT botnet detection using SVM and PSO optimization
WuFeature‐weighted naïve bayesian Classifier for wireless network intrusion detection
Tamy et al.An evaluation of machine learning algorithms to detect attacks in SCADA network
Roopak et al.An unsupervised approach for the detection of zero-day DDoS attacks in IoT networks
PandeyDesign and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system
Khoei et al.Densely connected neural networks for detecting denial of service attacks on smart grid network
Alhasan et al.A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection.
Yao et al.A two-layer soft-voting ensemble learning model for network intrusion detection
Balasubramanian et al.Optimized memory-augmented deep unfolding network with blockchain-based data preserving cyber security in internet of things
Kumar et al.Intrusion detection using artificial neural network with reduced input features
kadheem Hammood et al.Deep Learning Approaches for IoT Intrusion Detection Systems
Liu et al.A blockchain-assisted collaborative ensemble learning for network intrusion detection
Biju et al.Network intrusion detection system with an edge based hybrid feature selection approach
Hakami et al.Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
Divya et al.Intrusion Detection for Predicting Security Attacks Using Hybrid LSTM-GRU Classifiers

[8]
ページ先頭

©2009-2025 Movatter.jp