Chiang et al., 2022 - Google Patents
Risk and vulnerability assessment of secure autonomic communication networksChiang et al., 2022
View PDF- Document ID
- 12489309546954088986
- Author
- Chiang F
- Agbinya J
- Braun R
- Publication year
- Publication venue
- Advances in Broadband Communication and Networks
External Links
Snippet
Risk and Vulnerability Analysis (RVA) plays an important role in self-protecting and self- healing of Autonomic Communication Networks (ACNs). RVA aims at identifying the weaknesses of the networks that may be exploited to compromise the normal functions, such …
- 230000002567 autonomic effect 0 title abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0893—Assignment of logical groupings to network elements; Policy based network management or configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thakkar et al. | A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges | |
Al-Garadi et al. | A survey of machine and deep learning methods for internet of things (IoT) security | |
US20210273953A1 (en) | ENDPOINT AGENT CLIENT SENSORS (cSENSORS) AND ASSOCIATED INFRASTRUCTURES FOR EXTENDING NETWORK VISIBILITY IN AN ARTIFICIAL INTELLIGENCE (AI) THREAT DEFENSE ENVIRONMENT | |
US11522887B2 (en) | Artificial intelligence controller orchestrating network components for a cyber threat defense | |
Prabavathy et al. | Design of cognitive fog computing for intrusion detection in Internet of Things | |
Dilek et al. | Applications of artificial intelligence techniques to combating cyber crimes: A review | |
Abraham et al. | D-SCIDS: Distributed soft computing intrusion detection system | |
Gander et al. | Anomaly detection in the cloud: Detecting security incidents via machine learning | |
WO2021236661A1 (en) | Endpoint client sensors for extending network visibility | |
Lamba | A through analysis on protecting cyber threats and attacks on CPS embedded subsystems | |
Chiang et al. | Risk and vulnerability assessment of secure autonomic communication networks | |
Mbaya et al. | SecFedIDM-V1: A secure federated intrusion detection model with blockchain and deep bidirectional long short-term memory network | |
Radivilova et al. | Statistical and signature analysis methods of intrusion detection | |
Hentea | Intelligent system for information security management: Architecture and design issues. | |
Rajawat et al. | Analysis assaulting pattern for the security problem monitoring in 5G‐enabled sensor network systems with big data environment using artificial intelligence/machine learning | |
Lysenko et al. | Distributed Discrete Malware Detection Systems Based on Partial Centralization and Self-Organization | |
Candel et al. | Serverless security analysis for IoT applications | |
Rouff et al. | Sok: Autonomic cybersecurity-securing future disruptive technologies | |
Nyakundi | Using support vector machines in anomaly intrusion detection | |
Jagatheesaperumal et al. | Distributed Reinforcement Learning for IoT Security in Heterogeneous and Distributed Networks | |
Dubey et al. | A review of iot security: machine learning and deep learning perspective | |
Alcaraz et al. | Cyber-physical systems for wide-area situational awareness | |
Jiang et al. | Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks. | |
Pinzón et al. | Improving the security level of the FUSION@ multi-agent architecture | |
Prabavathy et al. | SDN based cognitive security system for large-scale Internet of Things using fog computing |