Bhuyan et al., 2017 - Google Patents
Network traffic anomaly detection and prevention: concepts, techniques, and toolsBhuyan et al., 2017
- Document ID
- 10250166258555790944
- Author
- Bhuyan M
- Bhattacharyya D
- Kalita J
- Publication year
External Links
- 238000001514 detection method 0 title abstract description 215
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhuyan et al. | Network traffic anomaly detection and prevention: concepts, techniques, and tools | |
US11902322B2 (en) | Method, apparatus, and system to map network reachability | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
Bhattacharyya et al. | Network anomaly detection: A machine learning perspective | |
Bhuyan et al. | Towards Generating Real-life Datasets for Network Intrusion Detection. | |
Dayal et al. | Research trends in security and DDoS in SDN | |
Su et al. | Detecting p2p botnet in software defined networks | |
Lyu et al. | A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection | |
Trost | Practical intrusion analysis: prevention and detection for the twenty-first century | |
Soltani et al. | Security of topology discovery service in sdn: Vulnerabilities and countermeasures | |
Ahmed et al. | A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN) | |
Khosravifar et al. | An experience improving intrusion detection systems false alarm ratio by using honeypot | |
Zekrifa | Hybrid Intrusion Detection System | |
Limmer et al. | Survey of event correlation techniques for attack detection in early warning systems | |
Bhuyan et al. | Network Traa c Anomaly Detection and Prevention | |
Meredith et al. | Increasing network resilience to persistent OSPF attacks | |
Maccari et al. | A Big Data and machine learning approach for network monitoring and security | |
La | Security monitoring for network protocols and applications | |
Bhuyan et al. | Networks and Network Traffic Anomalies | |
Niemelä | Traffic analysis for intrusion detection in telecommunications networks | |
Zhong | Process Mining and Machine Learning for Intrusion Detection | |
Sacramento et al. | Detecting Botnets and Unknown Network Attacks in Big Traffic Data | |
Kruegel | Network alertness: towards an adaptive, collaborating intrusion detection system | |
Ariffin et al. | Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed | |
Al-Nashif | Multi-level anomaly based autonomic intrusion detection system |