Villegas-Ch et al., 2025 - Google Patents
Integrating Explainable Artificial Intelligence in Anomaly Detection for Threat Management in E-Commerce PlatformsVillegas-Ch et al., 2025
View PDF- Document ID
- 5663408740595943197
- Author
- Villegas-Ch W
- Jaramillo-Alcazar A
- Navarro A
- Mera-Navarrete A
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
In modern cybersecurity, detecting sophisticated threats in high-volume and dynamic network environments is a persistent challenge. Current advanced techniques, such as recurrent neural networks and transformers, achieve remarkable precision but lack …
- 238000001514 detection method 0 title abstract description 61
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9319421B2 (en) | Real-time detection and classification of anomalous events in streaming data | |
Mutalib et al. | Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: A review | |
Alzoubi et al. | Research trends in deep learning and machine learning for cloud computing security | |
Mohammadpour et al. | A mean convolutional layer for intrusion detection system | |
Ofusori et al. | Artificial intelligence in cybersecurity: a comprehensive review and future direction | |
Villegas-Ch et al. | Integrating Explainable Artificial Intelligence in Anomaly Detection for Threat Management in E-Commerce Platforms | |
Taşcı | Deep-Learning-Based Approach for IoT Attack and Malware Detection. | |
Tendikov et al. | Security Information Event Management data acquisition and analysis methods with machine learning principles | |
Abiramasundari et al. | Distributed denial-of-service (DDOS) attack detection using supervised machine learning algorithms | |
Soni et al. | Learning-based model for phishing attack detection | |
Saied et al. | Explainable artificial intelligence for botnet detection in internet of things | |
Alshdadi et al. | Enhanced IoT Security for DDOS Attack Detection: Split Attention based ResNeXt-GRU Ensembler Approach | |
Van Hoang | Human expertise and machine learning in collaborative intelligence frameworks for robust cybersecurity solutions | |
Tariq et al. | Securing the evolving IoT with deep learning: a comprehensive review | |
Ranpara et al. | A simulation-driven computational framework for adaptive energy-efficient optimization in machine learning-based intrusion detection systems | |
Bibers et al. | A comprehensive comparative study of individual ML models and ensemble strategies for network intrusion detection systems | |
Razavi et al. | AI-Driven Cybersecurity: Revolutionizing Threat Detection and Defence Systems | |
Ibrahim et al. | BOTNET DETECTION USING INDEPENDENT COMPONENT ANALYSIS | |
Crowe et al. | Use of classification techniques to predict targets of cyber attacks for improving cyber situational awareness during the COVID-19 pandemic | |
Satapathy et al. | Machine Learning-Based Hybrid Feature Selection for Improvised Network Intrusion Detection | |
Govea et al. | Hybrid AI for Predictive Cyber Risk Assessment: Federated Graph-Transformer Architecture With Explainability | |
Reynolds | Research on the Application of Large Language Models in Cybersecurity | |
Tadi | Integrating Advanced Data Engineering with Machine Learning and AI for Early Detection and Mitigation of Cyber Threats in Real-Time Criminal Investigations | |
Heier et al. | Machine learning approaches to cybersecurity in the industrial internet of things: a review. | |
Mohammed et al. | Threat Intelligence for Business Analysts: Bridging the Gap Between Security and Strategy |