Movatterモバイル変換


[0]ホーム

URL:


Hajj et al., 2021 - Google Patents

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

Hajj et al., 2021

Document ID
4393512483829860103
Author
Hajj S
El Sibai R
Bou Abdo J
Demerjian J
Makhoul A
Guyeux C
Publication year
Publication venue
Transactions on Emerging Telecommunications Technologies

External Links

Snippet

With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring …
Continue reading atonlinelibrary.wiley.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation

Similar Documents

PublicationPublication DateTitle
Hajj et al.Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Ozkan-Okay et al.A comprehensive systematic literature review on intrusion detection systems
Santhosh Kumar et al.A comprehensive survey on machine learning‐based intrusion detection systems for secure communication in internet of things
Fernandes Jr et al.A comprehensive survey on network anomaly detection
US12225045B2 (en)Incorporating software-as-a-service data into a cyber threat defense system
Wani et al.SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
BijoneA survey on secure network: intrusion detection & prevention approaches
Bhuyan et al.Network anomaly detection: methods, systems and tools
Manhas et al.Implementation of intrusion detection system for internet of things using machine learning techniques
Repalle et al.Intrusion detection system using ai and machine learning algorithm
Kumar et al.Intrusion detection systems: a review
Deka et al.Network defense: Approaches, methods and techniques
MinAn analysis of K-means algorithm based network intrusion detection system
ThomasImproving intrusion detection for imbalanced network traffic
WangBig data in intrusion detection systems and intrusion prevention systems
MöllerIntrusion detection and prevention
Shankar et al.Deep analysis of risks and recent trends towards network intrusion detection system
Bhardwaj et al.Detection of cyber attacks: Xss, sqli, phishing attacks and detecting intrusion using machine learning algorithms
RazakA study on IDS for preventing Denial of Service attack using outliers techniques
Walling et al.A survey on intrusion detection systems: Types, datasets, machine learning methods for NIDS and challenges
Andreas et al.Flow-based and packet-based intrusion detection using BLSTM
Subramani et al.Comprehensive review on distributed denial of service attacks in wireless sensor networks
Bhati et al.A comprehensive study of intrusion detection and prevention systems
Stiawan et al.Characterizing network intrusion prevention system
Suresh et al.Detection of malicious activities by AI-Supported Anomaly-Based IDS

[8]
ページ先頭

©2009-2025 Movatter.jp