[go: up one dir, main page]

Bhatia et al., 2024 - Google Patents

Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse

Bhatia et al., 2024

Document ID
2314745050759911546
Author
Bhatia M
Sangwan S
Publication year
Publication venue
Personal and Ubiquitous Computing

External Links

Snippet

Cyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person's behavior and preferences …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches

Similar Documents

Publication Publication Date Title
Bhatia et al. Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Vinayakumar et al. Deep learning approach for intelligent intrusion detection system
Zeadally et al. Harnessing artificial intelligence capabilities to improve cybersecurity
Nisioti et al. From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Apruzzese et al. On the effectiveness of machine and deep learning for cyber security
Parrend et al. Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection
Devi et al. Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
Rathore et al. Real time intrusion detection system for ultra-high-speed big data environments
Bijone A survey on secure network: intrusion detection & prevention approaches
Wang et al. Big data analytics for network intrusion detection: A survey
Malik et al. [Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems
Vinayakumar et al. DBD: Deep learning DGA-based botnet detection
US8490197B2 (en) Sdi-scam
Chinedu et al. Cybercrime detection and prevention efforts in the last decade: an overview of the possibilities of machine learning models
David et al. Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security
Albayati et al. Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Ahsan Increasing the predictive potential of machine learning models for enhancing cybersecurity
Walling et al. A survey on intrusion detection systems: Types, datasets, machine learning methods for NIDS and challenges
Lah et al. Proposed framework for network lateral movement detection based on user risk scoring in siem
Rajasekar et al. Security analytics
Hazman et al. DEIGASe: Deep extraction and information gain for an optimal anomaly detection in IoT-based smart cities
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Kumar et al. Intrusion type classifier: A machine learning based approach for automated detection and classification of network intrusions