[go: up one dir, main page]

Volpe et al., 2024 - Google Patents

A Petri Net and LSTM Hybrid Approach for Intrusion Detection Systems in Enterprise Networks

Volpe et al., 2024

View HTML
Document ID
1253596982820651776
Author
Volpe G
Fiore M
la Grasta A
Albano F
Stefanizzi S
Mongiello M
Mangini A
Publication year
Publication venue
Sensors (Basel, Switzerland)

External Links

Snippet

Intrusion Detection Systems (IDSs) are a crucial component of modern corporate firewalls. The ability of IDS to identify malicious traffic is a powerful tool to prevent potential attacks and keep a corporate network secure. In this context, Machine Learning (ML)-based …
Continue reading at pmc.ncbi.nlm.nih.gov (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Chiramdasu et al. Malicious url detection using logistic regression
Thilagam et al. Intrusion detection for network based cloud computing by custom RC-NN and optimization
Srinivas et al. A novel machine learning inspired algorithm to predict real-time network intrusions
David et al. Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security
Sakthivel et al. Core‐level cybersecurity assurance using cloud‐based adaptive machine learning techniques for manufacturing industry
Boahen et al. A deep learning approach to online social network account compromisation
Abualkibash Machine learning in network security using KNIME analytics
Ahmed et al. Ransomware Detection System Based on Machine Learning.
Volpe et al. A Petri Net and LSTM Hybrid Approach for Intrusion Detection Systems in Enterprise Networks
Kumari et al. Leveraging blockchain and machine learning to counter DDoS attacks over IoT network
Patil et al. Malicious web pages detection using feature selection techniques and machine learning
Rabbani et al. A graph learning-based approach for lateral movement detection
Mohammadi et al. Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks
Patil et al. Learning to detect phishing web pages using lexical and string complexity analysis
Moarref et al. MC‐MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection
Rejimol Robinson et al. Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms
Rayala et al. Malicious URL detection using logistic regression
Akuthota et al. Network intrusion classification on the unsw-nb15 dataset using xgboost feature selection technique
Priyansh et al. Durbin: A comprehensive approach to analysis and detection of emerging threats due to network intrusion
Priya et al. Network intrusion detection system based security system for cloud services using novel recurrent neural network-autoencoder (NRNN-AE) and genetic
Eswaran et al. Survey of cyber security approaches for attack detection and prevention
Senthilkumar et al. An Efficient Investigation of Cloud Computing Security with Machine Learning Algorithm
Prakash et al. Elevating Intrusion Detection Precision with Multi-Classification Algorithm Analysis
Nguyen et al. Zero trust: Deep learning and NLP for HTTP anomaly detection in IDS
Awadh et al. A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques