[go: up one dir, main page]

Osareh et al., 2008 - Google Patents

Intrusion detection in computer networks based on machine learning algorithms

Osareh et al., 2008

View PDF
Document ID
12405940454716292540
Author
Osareh A
Shadgar B
Publication year
Publication venue
International Journal of Computer Science and Network Security

External Links

Snippet

Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements; they need to be reliable, extensible, easy to manage, and have low …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Kaushik et al. Application of machine learning and deep learning in cybersecurity: An innovative approach
Osareh et al. Intrusion detection in computer networks based on machine learning algorithms
Salem et al. A survey of insider attack detection research
US8793790B2 (en) System and method for insider threat detection
Stolfo et al. A comparative evaluation of two algorithms for windows registry anomaly detection
Yu A survey of anomaly intrusion detection techniques
AU2020102142A4 (en) Technique for multilayer protection from quantifiable vulnerabilities in industrial cyber physical system
Tetaly et al. Artificial intelligence in cyber security–A threat or a solution
Möller Intrusion detection and prevention
Datta et al. Real-time threat detection in ueba using unsupervised learning algorithms
Nadiammai et al. A comprehensive analysis and study in intrusion detection system using data mining techniques
Alsanad et al. Advanced persistent threat attack detection using clustering algorithms
Priyalakshmi et al. Analysis and implementation of normalisation techniques on KDD’99 data set for IDS and IPS
Choudhary et al. Neural network approach for intrusion detection
Čisar et al. Fuzzy-based intrusion detection systems
GÜler et al. Intrusion detection and classification based on deep learning
Jovanović et al. The impact of the application of antivirus programs on the security of computer systems
Shaout et al. Fuzzy zero day exploits detector system
Obimbo et al. Comparison of SVMs with radial-basis function & polynomial kernels in classification of categories in intrusion detection
Adenusi Dauda et al. Development of threats detection model for cyber situation awareness
Prasad et al. Comprehensive Review of Insider Threat Detection: Models, Datasets, and Metrics for Effective Threat Identification
Solanki et al. Intrusion detection technique using data mining approach: survey
Čeponis Research of machine and deep learning methods application for host-level intrusion detection and classification
Wishvaranga et al. Deltrux: Insider Threat Detection of End-User Behavior Analysis Using Machine Learning
Adamu et al. Comparison and Analysis of Data Mining Techniques for Intrusion Detection