[go: up one dir, main page]

Logeswari et al., 2023 - Google Patents

An intrusion detection system for sdn using machine learning

Logeswari et al., 2023

View PDF
Document ID
12367953192756290064
Author
Logeswari G
Bose S
Anitha T
et al.
Publication year
Publication venue
Intelligent Automation & Soft Computing

External Links

Snippet

Software Defined Networking (SDN) has emerged as a promising and exciting option for the future growth of the internet. SDN has increased the flexibility and transparency of the managed, centralized, and controlled network. On the other hand, these advantages create …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models

Similar Documents

Publication Publication Date Title
Logeswari et al. An intrusion detection system for sdn using machine learning
Thakkar et al. A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Abdelkhalek et al. Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning
Shitharth et al. An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system
Miah et al. Improving detection accuracy for imbalanced network intrusion classification using cluster-based under-sampling with random forests
Jha et al. Intrusion detection system using support vector machine
Khan et al. A survey on intrusion detection systems and classification techniques
Yilmaz Intrusion detection in computer networks using optimized machine learning algorithms
Hammood et al. Ensemble machine learning approach for IoT intrusion detection systems
Zhao et al. Machine-learning based TCP security action prediction
Monshizadeh et al. Security related data mining
Khaleefah et al. Detection of iot botnet cyber attacks using machine learning
Khan et al. Artificial neural network-based intrusion detection in cloud computing using CSE-CIC-IDS2018 datasets
Al‐Sharif et al. Enhancing cloud security: A study on ensemble learning‐based intrusion detection systems
Putro et al. Feature Selection Using Pearson Correlation with Lasso Regression for Intrusion Detection System
Singh et al. A hybrid approach for intrusion detection based on machine learning
Das et al. A comparative analysis of deep learning approaches in intrusion detection system
Rele et al. Exploring Ransomware Detection Based on Artificial Intelligence and Machine Learning
Almohagri et al. Machine learning approach for distributed daniel of service attack detection in sdns
Gosu et al. A hybrid approach for the analysis of feature selection using information gain and BAT techniques on the anomaly detection
Uzun et al. Performance evaluation of machine learning algorithms for detecting abnormal data traffic in computer networks
Bandyopadhyay et al. A decision tree based intrusion detection system for identification of malicious web attacks
Jayapal et al. Investigation of LSSVM and RBFNN-based techniques for intrusion detection systems for IoT networks
Kumari et al. Prediction of data breaches using classification algorithms
Sameera et al. Intrusion detection analytics: a comprehensive survey