[go: up one dir, main page]

Xu, 2023 - Google Patents

Research and application of network security detection technology based on computer vision

Xu, 2023

Document ID
16966498880102460621
Author
Xu J
Publication year
Publication venue
Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023)

External Links

Snippet

With the development of the Internet and the advent of the digital era, the Internet has become an indispensable part of people's daily lives. However, along with the development of the network, there are more and more cyber-attacks, which not only pose a threat to …
Continue reading at www.spiedigitallibrary.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer

Similar Documents

Publication Publication Date Title
Almaiah et al. Classification of cyber security threats on mobile devices and applications
Sudhakar et al. An emerging threat Fileless malware: a survey and research challenges
Sadqi et al. A systematic review and taxonomy of web applications threats
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Mathane et al. Predictive analysis of ransomware attacks using context-aware AI in IoT systems
Vignesh Saravanan et al. Data protection and security enhancement in cyber-physical systems using AI and blockchain
Nayak et al. Data storage and transmission security in the cloud: The artificial intelligence (AI) edge
Bhardwaj et al. Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics
Mohd Saudi et al. iOS mobile malware analysis: a state-of-the-art
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Gangwani et al. A comprehensive review on cloud security using machine learning techniques
Georgina et al. Deception based techniques against ransomwares: A systematic review
Uyyala Multilevel authentication system using hierarchical intrusion detection architecture for online banking
Jiang Communication network security situation analysis based on time series data mining technology
Okolo A Review of Machine and Deep Learning Approaches for Enhancing Cybersecurity and Privacy in the Internet of Devices
Dahiya Malware detection in IoT
Kant How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning
Xu Research and application of network security detection technology based on computer vision
Frade et al. DBD-Guardian and Privacy-Aware Near Real-Time Cybersecurity Analytics
Ahmad et al. Big Data and Its Role in Cybersecurity
Cai et al. Medical big data intrusion detection system based on virtual data analysis from assurance perspective
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Möller Introduction to Cybersecurity
Kolokotronis et al. Cyber-trust: The shield for IoT cyber-attacks
Amanuel et al. A Review of the Various Machine Learning Algorithms for Cloud Computing