Osareh et al., 2008 - Google Patents
Intrusion detection in computer networks based on machine learning algorithmsOsareh et al., 2008
View PDF- Document ID
- 12405940454716292540
- Author
- Osareh A
- Shadgar B
- Publication year
- Publication venue
- International Journal of Computer Science and Network Security
External Links
Snippet
Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements; they need to be reliable, extensible, easy to manage, and have low …
- 238000001514 detection method 0 title abstract description 80
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kaushik et al. | Application of machine learning and deep learning in cybersecurity: An innovative approach | |
Osareh et al. | Intrusion detection in computer networks based on machine learning algorithms | |
Salem et al. | A survey of insider attack detection research | |
US8793790B2 (en) | System and method for insider threat detection | |
Stolfo et al. | A comparative evaluation of two algorithms for windows registry anomaly detection | |
Yu | A survey of anomaly intrusion detection techniques | |
AU2020102142A4 (en) | Technique for multilayer protection from quantifiable vulnerabilities in industrial cyber physical system | |
Tetaly et al. | Artificial intelligence in cyber security–A threat or a solution | |
Möller | Intrusion detection and prevention | |
Datta et al. | Real-time threat detection in ueba using unsupervised learning algorithms | |
Nadiammai et al. | A comprehensive analysis and study in intrusion detection system using data mining techniques | |
Alsanad et al. | Advanced persistent threat attack detection using clustering algorithms | |
Priyalakshmi et al. | Analysis and implementation of normalisation techniques on KDD’99 data set for IDS and IPS | |
Choudhary et al. | Neural network approach for intrusion detection | |
Čisar et al. | Fuzzy-based intrusion detection systems | |
GÜler et al. | Intrusion detection and classification based on deep learning | |
Jovanović et al. | The impact of the application of antivirus programs on the security of computer systems | |
Shaout et al. | Fuzzy zero day exploits detector system | |
Obimbo et al. | Comparison of SVMs with radial-basis function & polynomial kernels in classification of categories in intrusion detection | |
Adenusi Dauda et al. | Development of threats detection model for cyber situation awareness | |
Prasad et al. | Comprehensive Review of Insider Threat Detection: Models, Datasets, and Metrics for Effective Threat Identification | |
Solanki et al. | Intrusion detection technique using data mining approach: survey | |
Čeponis | Research of machine and deep learning methods application for host-level intrusion detection and classification | |
Wishvaranga et al. | Deltrux: Insider Threat Detection of End-User Behavior Analysis Using Machine Learning | |
Adamu et al. | Comparison and Analysis of Data Mining Techniques for Intrusion Detection |