Hindy et al., 2018 - Google Patents
A taxonomy of network threats and the effect of current datasets on intrusion detection systemsHindy et al., 2018
View PDF- Document ID
- 14168432199562975767
- Author
- Hindy H
- Brosset D
- Bayne E
- Seeam A
- Tachtatzis C
- Atkinson R
- Bellekens X
- Publication year
- Publication venue
- arXiv preprint arXiv:1806.03517
External Links
Snippet
As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hindy et al. | A taxonomy of network threats and the effect of current datasets on intrusion detection systems | |
| Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
| Mijwil et al. | The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review | |
| Hindy et al. | A taxonomy and survey of intrusion detection system design techniques, network threats and datasets | |
| Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
| Meng et al. | Collaborative security: A survey and taxonomy | |
| Sowah et al. | Detection and prevention of man‐in‐the‐middle spoofing attacks in MANETs using predictive techniques in artificial neural networks (ANN) | |
| Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
| Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
| Albayati et al. | Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system | |
| Möller | Intrusion detection and prevention | |
| Younus et al. | A survey on network security monitoring: tools and functionalities | |
| Sheeja | Intrusion detection system and mitigation of threats in IoT networks using AI techniques: A review | |
| Austin | IOT malicious traffic classification using machine learning | |
| SH | Network traffic analysis through deep learning for detection of an army of bots in health IoT network | |
| Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
| Jaisingh et al. | Machine learning in cyber threats intelligent system | |
| Jean-Philippe | Enhancing computer network defense technologies with machine learning and artificial intelligence | |
| Hagar | Big data analytic using machine learning algorithms for intrusion detection system: A survey | |
| Amar et al. | Weighted LSTM for intrusion detection and data mining to prevent attacks | |
| Almuseelem | Perspective Chapter: Intrusion Detection Systems in Cloud | |
| Zoghi | Ensemble Classifier Design and Performance Evaluation for Intrusion Detection Using UNSW-NB15 Dataset | |
| Ali et al. | Behavior analysis of machine learning algorithms for botnets detection | |
| Canpolat et al. | Boosting Based IDS System for Local Network Intrusions | |
| Sama | Network intrusion detection using deep learning |