Volpe et al., 2024 - Google Patents
A Petri Net and LSTM Hybrid Approach for Intrusion Detection Systems in Enterprise NetworksVolpe et al., 2024
View HTML- Document ID
- 1253596982820651776
- Author
- Volpe G
- Fiore M
- la Grasta A
- Albano F
- Stefanizzi S
- Mongiello M
- Mangini A
- Publication year
- Publication venue
- Sensors (Basel, Switzerland)
External Links
Snippet
Intrusion Detection Systems (IDSs) are a crucial component of modern corporate firewalls. The ability of IDS to identify malicious traffic is a powerful tool to prevent potential attacks and keep a corporate network secure. In this context, Machine Learning (ML)-based …
- 238000013459 approach 0 title description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chiramdasu et al. | Malicious url detection using logistic regression | |
| Thilagam et al. | Intrusion detection for network based cloud computing by custom RC-NN and optimization | |
| Srinivas et al. | A novel machine learning inspired algorithm to predict real-time network intrusions | |
| David et al. | Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security | |
| Sakthivel et al. | Core‐level cybersecurity assurance using cloud‐based adaptive machine learning techniques for manufacturing industry | |
| Boahen et al. | A deep learning approach to online social network account compromisation | |
| Abualkibash | Machine learning in network security using KNIME analytics | |
| Ahmed et al. | Ransomware Detection System Based on Machine Learning. | |
| Volpe et al. | A Petri Net and LSTM Hybrid Approach for Intrusion Detection Systems in Enterprise Networks | |
| Kumari et al. | Leveraging blockchain and machine learning to counter DDoS attacks over IoT network | |
| Patil et al. | Malicious web pages detection using feature selection techniques and machine learning | |
| Rabbani et al. | A graph learning-based approach for lateral movement detection | |
| Mohammadi et al. | Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks | |
| Patil et al. | Learning to detect phishing web pages using lexical and string complexity analysis | |
| Moarref et al. | MC‐MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection | |
| Rejimol Robinson et al. | Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms | |
| Rayala et al. | Malicious URL detection using logistic regression | |
| Akuthota et al. | Network intrusion classification on the unsw-nb15 dataset using xgboost feature selection technique | |
| Priyansh et al. | Durbin: A comprehensive approach to analysis and detection of emerging threats due to network intrusion | |
| Priya et al. | Network intrusion detection system based security system for cloud services using novel recurrent neural network-autoencoder (NRNN-AE) and genetic | |
| Eswaran et al. | Survey of cyber security approaches for attack detection and prevention | |
| Senthilkumar et al. | An Efficient Investigation of Cloud Computing Security with Machine Learning Algorithm | |
| Prakash et al. | Elevating Intrusion Detection Precision with Multi-Classification Algorithm Analysis | |
| Nguyen et al. | Zero trust: Deep learning and NLP for HTTP anomaly detection in IDS | |
| Awadh et al. | A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques |