Rodríguez et al., 2022 - Google Patents
Evaluation of machine learning techniques for traffic flow-based intrusion detectionRodríguez et al., 2022
View HTML- Document ID
- 4309403082686267399
- Author
- Rodríguez M
- Alesanco A
- Mehavilla L
- García J
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Cybersecurity is one of the great challenges of today's world. Rapid technological development has allowed society to prosper and improve the quality of life and the world is more dependent on new technologies. Managing security risks quickly and effectively …
- 238000000034 method 0 title abstract description 150
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rodríguez et al. | Evaluation of machine learning techniques for traffic flow-based intrusion detection | |
| ElKashlan et al. | A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs) | |
| Zachos et al. | An anomaly-based intrusion detection system for internet of medical things networks | |
| Alahmadi et al. | DDoS attack detection in IoT-based networks using machine learning models: a survey and research directions | |
| Magán-Carrión et al. | Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches | |
| Tang et al. | DeepIDS: Deep learning approach for intrusion detection in software defined networking | |
| Mahfouz et al. | Ensemble classifiers for network intrusion detection using a novel network attack dataset | |
| Sagar et al. | Applications in security and evasions in machine learning: a survey | |
| Fernandez Maimo et al. | Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments | |
| Alosaimi et al. | An intrusion detection system using BoT-IoT | |
| Javed et al. | An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT) | |
| Alwhbi et al. | Encrypted network traffic analysis and classification utilizing machine learning | |
| Demertzis et al. | The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks | |
| Zehra et al. | Machine learning-based anomaly detection in NFV: A comprehensive survey | |
| Nkongolo et al. | Ugransome1819: A novel dataset for anomaly detection and zero-day threats | |
| Imanbayev et al. | Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond | |
| Ullah et al. | Enhanced network intrusion detection system for internet of things security using multimodal big data representation with transfer learning and game theory | |
| Azeez et al. | Network intrusion detection with a hashing based apriori algorithm using Hadoop MapReduce | |
| Mishra | Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy | |
| Rehman et al. | Ffl-ids: a fog-enabled federated learning-based intrusion detection system to counter jamming and spoofing attacks for the industrial internet of things | |
| Harrou et al. | Exploiting autoencoder-based anomaly detection to enhance cybersecurity in power grids | |
| Pivarníková et al. | Early-stage detection of cyber attacks | |
| Saminathan et al. | An artificial neural network autoencoder for insider cyber security threat detection | |
| Makhmudov et al. | Online machine learning for intrusion detection in electric vehicle charging systems | |
| Nassreddine et al. | Ensemble learning for network intrusion detection based on correlation and embedded feature selection techniques |