[go: up one dir, main page]

Hindy et al., 2018 - Google Patents

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

Hindy et al., 2018

View PDF
Document ID
14168432199562975767
Author
Hindy H
Brosset D
Bayne E
Seeam A
Tachtatzis C
Atkinson R
Bellekens X
Publication year
Publication venue
arXiv preprint arXiv:1806.03517

External Links

Snippet

As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing

Similar Documents

Publication Publication Date Title
Hindy et al. A taxonomy of network threats and the effect of current datasets on intrusion detection systems
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Mijwil et al. The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review
Hindy et al. A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Meng et al. Collaborative security: A survey and taxonomy
Sowah et al. Detection and prevention of man‐in‐the‐middle spoofing attacks in MANETs using predictive techniques in artificial neural networks (ANN)
Moustafa Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Albayati et al. Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
Möller Intrusion detection and prevention
Younus et al. A survey on network security monitoring: tools and functionalities
Sheeja Intrusion detection system and mitigation of threats in IoT networks using AI techniques: A review
Austin IOT malicious traffic classification using machine learning
SH Network traffic analysis through deep learning for detection of an army of bots in health IoT network
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Jaisingh et al. Machine learning in cyber threats intelligent system
Jean-Philippe Enhancing computer network defense technologies with machine learning and artificial intelligence
Hagar Big data analytic using machine learning algorithms for intrusion detection system: A survey
Amar et al. Weighted LSTM for intrusion detection and data mining to prevent attacks
Almuseelem Perspective Chapter: Intrusion Detection Systems in Cloud
Zoghi Ensemble Classifier Design and Performance Evaluation for Intrusion Detection Using UNSW-NB15 Dataset
Ali et al. Behavior analysis of machine learning algorithms for botnets detection
Canpolat et al. Boosting Based IDS System for Local Network Intrusions
Sama Network intrusion detection using deep learning