Holubenko et al., 2025 - Google Patents
Autonomous intrusion detection for IoT: a decentralized and privacy preserving approachHolubenko et al., 2025
View HTML- Document ID
- 13674528932885284911
- Author
- Holubenko V
- Gaspar D
- Leal R
- Silva P
- Publication year
- Publication venue
- International Journal of Information Security
External Links
Snippet
Abstract The Internet of Things (IoT) has been increasingly adopted in domains such as smart infrastructure, healthcare, supply chain, transportation, and many others. However, the constrained computational resources of these devices make conventional security …
- 238000013459 approach 0 title abstract description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Charmet et al. | Explainable artificial intelligence for cybersecurity: a literature survey | |
| Omer et al. | A novel optimized probabilistic neural network approach for intrusion detection and categorization | |
| Rabie et al. | A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models | |
| Salvakkam et al. | Enhanced quantum-secure ensemble intrusion detection techniques for cloud based on deep learning | |
| Kozachok et al. | Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis | |
| Islam et al. | Automated interpretation and integration of security tools using semantic knowledge | |
| Holubenko et al. | Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach | |
| Ren et al. | APT attack detection based on graph convolutional neural networks | |
| Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
| Oh et al. | volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model | |
| Thaljaoui | Intelligent network intrusion detection system using optimized deep CNN-LSTM with UNSW-NB15 | |
| Edkrantz | Predicting exploit likelihood for cyber vulnerabilities with machine learning | |
| WO2025049586A1 (en) | Generative sequence processing models for cybersecurity | |
| Pardhi et al. | Classification of malware from the network traffic using hybrid and deep learning based approach | |
| Sharma et al. | IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions | |
| Singh et al. | SHIELD: A multimodal deep learning framework for Android malware detection | |
| Kunwar et al. | SoK: Leveraging Transformers for Malware Analysis | |
| NR | Federated transfer learning for intrusion detection system in industrial iot 4.0 | |
| Alsharaiah et al. | An explainable AI-driven transformer model for spoofing attack detection in Internet of Medical Things (IoMT) networks | |
| Mawoh et al. | An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence | |
| Priya et al. | An effective deep learning-based variational autoencoder for zero-day attack detection model | |
| Alsubaei et al. | BERT ensemble based MBR framework for android malware detection | |
| Jemili et al. | Active intrusion detection and prediction based on temporal big data analytics | |
| Ravi et al. | A Novel Mechanism for Tuning Neural Network for Malware Detection in Android Device | |
| Selvaganapathy et al. | Anti-malware engines under adversarial attacks |