[go: up one dir, main page]

Hamed et al., 2017 - Google Patents

A survey and taxonomy of classifiers of intrusion detection systems

Hamed et al., 2017

View PDF
Document ID
14201308397192032237
Author
Hamed T
Ernst J
Kremer S
Publication year
Publication venue
Computer and network security essentials

External Links

Snippet

In this chapter, a new review and taxonomy of the classifiers that have been used with intrusion detection systems in the last two decades is presented. The main objective of this chapter is to provide the reader with the knowledge required to build an effective classifier …
Continue reading at ndl.ethernet.edu.et (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Hamed et al. A survey and taxonomy of classifiers of intrusion detection systems
Singh et al. An edge based hybrid intrusion detection framework for mobile edge computing
El-Sofany et al. Using machine learning algorithms to enhance IoT system security
Pradeep Mohan Kumar et al. Intrusion detection system based on GA‐fuzzy classifier for detecting malicious attacks
Azad et al. Data mining in intrusion detection: a comparative study of methods, types and data sets
Veena et al. C SVM classification and KNN techniques for cyber crime detection
Subaira et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey
Jiang et al. Sok: Applying machine learning in security-a survey
US20240372882A1 (en) Systems and methods for detecting malicious network traffic using multi-domain machine learning
Sharma et al. Detection of DDoS attacks using machine learning in cloud computing
Kumar et al. Applications of machine learning techniques in the realm of cybersecurity
Churcher et al. ur Rehman
Razak A study on IDS for preventing Denial of Service attack using outliers techniques
Rajasekar et al. Security analytics
Kshirsagar et al. Identifying reduced features based on ig-threshold for dos attack detection using part
Singh et al. An anomaly-based intrusion detection system for IoT networks using trust factor
Prabhakaran et al. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Pasupathi et al. Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security
Jiang Communication network security situation analysis based on time series data mining technology
Molcer et al. Machine learning based network intrusion detection system for internet of things cybersecurity
Uppal et al. Enhancing accuracy through ensemble based machine learning for intrusion detection and privacy preservation over the network of smart cities
Dalai et al. Hybrid network intrusion detection systems: a decade’s perspective
Sharma et al. Advances and challenges in cryptography using artificial intelligence
Pao et al. Statistical learning methods for information security: fundamentals and case studies
Hrabovsky et al. Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems