[go: up one dir, main page]

Chiang et al., 2022 - Google Patents

Risk and vulnerability assessment of secure autonomic communication networks

Chiang et al., 2022

View PDF
Document ID
12489309546954088986
Author
Chiang F
Agbinya J
Braun R
Publication year
Publication venue
Advances in Broadband Communication and Networks

External Links

Snippet

Risk and Vulnerability Analysis (RVA) plays an important role in self-protecting and self- healing of Autonomic Communication Networks (ACNs). RVA aims at identifying the weaknesses of the networks that may be exploited to compromise the normal functions, such …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0893Assignment of logical groupings to network elements; Policy based network management or configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Thakkar et al. A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges
Al-Garadi et al. A survey of machine and deep learning methods for internet of things (IoT) security
US20210273953A1 (en) ENDPOINT AGENT CLIENT SENSORS (cSENSORS) AND ASSOCIATED INFRASTRUCTURES FOR EXTENDING NETWORK VISIBILITY IN AN ARTIFICIAL INTELLIGENCE (AI) THREAT DEFENSE ENVIRONMENT
US11522887B2 (en) Artificial intelligence controller orchestrating network components for a cyber threat defense
Prabavathy et al. Design of cognitive fog computing for intrusion detection in Internet of Things
Dilek et al. Applications of artificial intelligence techniques to combating cyber crimes: A review
Abraham et al. D-SCIDS: Distributed soft computing intrusion detection system
Gander et al. Anomaly detection in the cloud: Detecting security incidents via machine learning
WO2021236661A1 (en) Endpoint client sensors for extending network visibility
Lamba A through analysis on protecting cyber threats and attacks on CPS embedded subsystems
Chiang et al. Risk and vulnerability assessment of secure autonomic communication networks
Mbaya et al. SecFedIDM-V1: A secure federated intrusion detection model with blockchain and deep bidirectional long short-term memory network
Radivilova et al. Statistical and signature analysis methods of intrusion detection
Hentea Intelligent system for information security management: Architecture and design issues.
Rajawat et al. Analysis assaulting pattern for the security problem monitoring in 5G‐enabled sensor network systems with big data environment using artificial intelligence/machine learning
Lysenko et al. Distributed Discrete Malware Detection Systems Based on Partial Centralization and Self-Organization
Candel et al. Serverless security analysis for IoT applications
Rouff et al. Sok: Autonomic cybersecurity-securing future disruptive technologies
Nyakundi Using support vector machines in anomaly intrusion detection
Jagatheesaperumal et al. Distributed Reinforcement Learning for IoT Security in Heterogeneous and Distributed Networks
Dubey et al. A review of iot security: machine learning and deep learning perspective
Alcaraz et al. Cyber-physical systems for wide-area situational awareness
Jiang et al. Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks.
Pinzón et al. Improving the security level of the FUSION@ multi-agent architecture
Prabavathy et al. SDN based cognitive security system for large-scale Internet of Things using fog computing