Asaju et al., 2017 - Google Patents
Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithmAsaju et al., 2017
View PDF- Document ID
- 4598578332002469183
- Author
- Asaju L
- Shola P
- Franklin N
- Abiola H
- Publication year
- Publication venue
- FUW Trends Sci. Technol. J
External Links
Snippet
Intrusion detection is the process of monitor the event occurring in a computer network and analyzing them for signs of intrusions. In recent years, the needs of internet are felt in lives of many people. Accordingly, many studies have been done on security in virtual …
- 238000001514 detection method 0 title abstract description 64
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Olusola et al. | Analysis of KDD’99 intrusion detection dataset for selection of relevance features | |
| Chauhan et al. | A comparative study of classification techniques for intrusion detection | |
| Verma et al. | Review of existing data sets for network intrusion detection system | |
| Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey | |
| Chetan et al. | Data mining based network intrusion detection system: A database centric approach | |
| Chaudhari et al. | Intrusion detection system: classification, techniques and datasets to implement | |
| Asaju et al. | Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithm | |
| Dharamkar et al. | A review of cyber attack classification technique based on data mining and neural network approach | |
| Singh et al. | Intrusion detection system using data mining a review | |
| Niranjan et al. | Security in data mining-a comprehensive survey | |
| Yang et al. | Clustering and classification based anomaly detection | |
| Rafsanjani et al. | Intrusion detection by data mining algorithms: a review | |
| Aldhyani et al. | Analysis of dimensionality reduction in intrusion detection | |
| Singh et al. | Network intrusion detection system using decision tree and KNN algorithm | |
| Phutane et al. | A survey of intrusion detection system using different data mining techniques | |
| Agrawal et al. | A review on various methods of intrusion detection system | |
| Guan et al. | Applications of fuzzy data mining methods for intrusion detection systems | |
| Farid et al. | Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection | |
| Yogesh et al. | Characterization of darknet traffic detection using time domain features | |
| Chahira | Model for intrusion detection based on hybrid feature selection techniques | |
| Deepa et al. | Efficient intrusion detection system using random tree | |
| Malek et al. | GUI-based user behavior intrusion detection | |
| Ahmad et al. | Hybrid intrusion detection method to increase anomaly detection by using data mining techniques | |
| Aung et al. | Hybrid intrusion detection system using K-means and random tree algorithms | |
| Sabha | Anomaly-based Intrusion Detection using Machine Learning Algorithms-A Review Paper |