Bhatia et al., 2024 - Google Patents
Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuseBhatia et al., 2024
- Document ID
- 2314745050759911546
- Author
- Bhatia M
- Sangwan S
- Publication year
- Publication venue
- Personal and Ubiquitous Computing
External Links
Snippet
Cyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person's behavior and preferences …
- 238000001514 detection method 0 title abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhatia et al. | Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse | |
Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
Vinayakumar et al. | Deep learning approach for intelligent intrusion detection system | |
Zeadally et al. | Harnessing artificial intelligence capabilities to improve cybersecurity | |
Nisioti et al. | From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods | |
Apruzzese et al. | On the effectiveness of machine and deep learning for cyber security | |
Parrend et al. | Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection | |
Devi et al. | Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments | |
Rathore et al. | Real time intrusion detection system for ultra-high-speed big data environments | |
Bijone | A survey on secure network: intrusion detection & prevention approaches | |
Wang et al. | Big data analytics for network intrusion detection: A survey | |
Malik et al. | [Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems | |
Vinayakumar et al. | DBD: Deep learning DGA-based botnet detection | |
US8490197B2 (en) | Sdi-scam | |
Chinedu et al. | Cybercrime detection and prevention efforts in the last decade: an overview of the possibilities of machine learning models | |
David et al. | Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security | |
Albayati et al. | Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system | |
Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
Ahsan | Increasing the predictive potential of machine learning models for enhancing cybersecurity | |
Walling et al. | A survey on intrusion detection systems: Types, datasets, machine learning methods for NIDS and challenges | |
Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
Rajasekar et al. | Security analytics | |
Hazman et al. | DEIGASe: Deep extraction and information gain for an optimal anomaly detection in IoT-based smart cities | |
Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
Kumar et al. | Intrusion type classifier: A machine learning based approach for automated detection and classification of network intrusions |