[go: up one dir, main page]

Atli et al., 2018 - Google Patents

Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space

Atli et al., 2018

View PDF
Document ID
16133095580468360505
Author
Atli B
Miche Y
Kalliola A
Oliver I
Holtmanns S
Lendasse A
Publication year
Publication venue
Cognitive Computation

External Links

Snippet

Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This …
Continue reading at drive.google.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6251Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Atli et al. Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space
Thakkar et al. A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Ge et al. Towards a deep learning-driven intrusion detection approach for Internet of Things
Samy et al. Fog-based attack detection framework for internet of things using deep learning
Jha et al. Intrusion detection system using support vector machine
Folino et al. Ensemble based collaborative and distributed intrusion detection systems: A survey
Abadeh et al. A parallel genetic local search algorithm for intrusion detection in computer networks
Pektaş et al. A deep learning method to detect network intrusion through flow‐based features
Carrasco et al. Unsupervised intrusion detection through skip-gram models of network behavior
Fahad et al. Toward an efficient and scalable feature selection approach for internet traffic classification
Ibrahimi et al. Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA
Altaf et al. NE-GConv: A lightweight node edge graph convolutional network for intrusion detection
Garg et al. HyClass: Hybrid classification model for anomaly detection in cloud environment
Monshizadeh et al. Performance evaluation of a combined anomaly detection platform
Fitriani et al. Review of semi-supervised method for intrusion detection system
Maseer et al. Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Atli Anomaly-based intrusion detection by modeling probability distributions of flow characteristics
Wei et al. Reconstruction-based lstm-autoencoder for anomaly-based ddos attack detection over multivariate time-series data
Attak et al. Application of distributed computing and machine learning technologies to cybersecurity
Awad et al. Addressing imbalanced classes problem of intrusion detection system using weighted extreme learning machine
Ravi Deep learning-based network intrusion detection in smart healthcare enterprise systems
Benmalek et al. Particle swarm optimization-enhanced machine learning and deep learning techniques for Internet of Things intrusion detection
Mwitondi et al. A robust domain partitioning intrusion detection method
Sarasamma et al. Min-max hyperellipsoidal clustering for anomaly detection in network security
Yadav et al. Enhancement of intrusion detection system using machine learning