[go: up one dir, main page]

Bhuyan et al., 2017 - Google Patents

Network traffic anomaly detection and prevention: concepts, techniques, and tools

Bhuyan et al., 2017

Document ID
10250166258555790944
Author
Bhuyan M
Bhattacharyya D
Kalita J
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Similar Documents

Publication Publication Date Title
Bhuyan et al. Network traffic anomaly detection and prevention: concepts, techniques, and tools
US11902322B2 (en) Method, apparatus, and system to map network reachability
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Bhattacharyya et al. Network anomaly detection: A machine learning perspective
Bhuyan et al. Towards Generating Real-life Datasets for Network Intrusion Detection.
Dayal et al. Research trends in security and DDoS in SDN
Su et al. Detecting p2p botnet in software defined networks
Lyu et al. A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection
Trost Practical intrusion analysis: prevention and detection for the twenty-first century
Soltani et al. Security of topology discovery service in sdn: Vulnerabilities and countermeasures
Ahmed et al. A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)
Khosravifar et al. An experience improving intrusion detection systems false alarm ratio by using honeypot
Zekrifa Hybrid Intrusion Detection System
Limmer et al. Survey of event correlation techniques for attack detection in early warning systems
Bhuyan et al. Network Traa c Anomaly Detection and Prevention
Meredith et al. Increasing network resilience to persistent OSPF attacks
Maccari et al. A Big Data and machine learning approach for network monitoring and security
La Security monitoring for network protocols and applications
Bhuyan et al. Networks and Network Traffic Anomalies
Niemelä Traffic analysis for intrusion detection in telecommunications networks
Zhong Process Mining and Machine Learning for Intrusion Detection
Sacramento et al. Detecting Botnets and Unknown Network Attacks in Big Traffic Data
Kruegel Network alertness: towards an adaptive, collaborating intrusion detection system
Ariffin et al. Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed
Al-Nashif Multi-level anomaly based autonomic intrusion detection system