Hamed et al., 2017 - Google Patents
A survey and taxonomy of classifiers of intrusion detection systemsHamed et al., 2017
View PDF- Document ID
- 14201308397192032237
- Author
- Hamed T
- Ernst J
- Kremer S
- Publication year
- Publication venue
- Computer and network security essentials
External Links
Snippet
In this chapter, a new review and taxonomy of the classifiers that have been used with intrusion detection systems in the last two decades is presented. The main objective of this chapter is to provide the reader with the knowledge required to build an effective classifier …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamed et al. | A survey and taxonomy of classifiers of intrusion detection systems | |
Singh et al. | An edge based hybrid intrusion detection framework for mobile edge computing | |
El-Sofany et al. | Using machine learning algorithms to enhance IoT system security | |
Pradeep Mohan Kumar et al. | Intrusion detection system based on GA‐fuzzy classifier for detecting malicious attacks | |
Azad et al. | Data mining in intrusion detection: a comparative study of methods, types and data sets | |
Veena et al. | C SVM classification and KNN techniques for cyber crime detection | |
Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey | |
Jiang et al. | Sok: Applying machine learning in security-a survey | |
US20240372882A1 (en) | Systems and methods for detecting malicious network traffic using multi-domain machine learning | |
Sharma et al. | Detection of DDoS attacks using machine learning in cloud computing | |
Kumar et al. | Applications of machine learning techniques in the realm of cybersecurity | |
Churcher et al. | ur Rehman | |
Razak | A study on IDS for preventing Denial of Service attack using outliers techniques | |
Rajasekar et al. | Security analytics | |
Kshirsagar et al. | Identifying reduced features based on ig-threshold for dos attack detection using part | |
Singh et al. | An anomaly-based intrusion detection system for IoT networks using trust factor | |
Prabhakaran et al. | mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system | |
Pasupathi et al. | Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security | |
Jiang | Communication network security situation analysis based on time series data mining technology | |
Molcer et al. | Machine learning based network intrusion detection system for internet of things cybersecurity | |
Uppal et al. | Enhancing accuracy through ensemble based machine learning for intrusion detection and privacy preservation over the network of smart cities | |
Dalai et al. | Hybrid network intrusion detection systems: a decade’s perspective | |
Sharma et al. | Advances and challenges in cryptography using artificial intelligence | |
Pao et al. | Statistical learning methods for information security: fundamentals and case studies | |
Hrabovsky et al. | Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems |