[go: up one dir, main page]

Deore et al., 2022 - Google Patents

Intrusion detection system based on RNN classifier for feature reduction

Deore et al., 2022

View PDF
Document ID
3538306312985136429
Author
Deore B
Bhosale S
Publication year
Publication venue
SN Computer Science

External Links

Snippet

Due to the increase in the use of the internet all over the world for business and education activates, cybercrime is increasing day by day in spite of the development of security protocols and algorithms. Recent research is based on the intrusion detection system. We …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models

Similar Documents

Publication Publication Date Title
Logeswari et al. An intrusion detection system for sdn using machine learning
Aljawarneh et al. An enhanced J48 classification algorithm for the anomaly intrusion detection systems
An et al. Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)
Lian et al. An intrusion detection method based on decision tree‐recursive feature elimination in ensemble learning
Zhang et al. A deep learning method to detect web attacks using a specially designed CNN
Deore et al. Intrusion detection system based on RNN classifier for feature reduction
Azzaoui et al. Developing new deep-learning model to enhance network intrusion classification
Salvakkam et al. Enhanced quantum-secure ensemble intrusion detection techniques for cloud based on deep learning
Zabihimayvan et al. A soft computing approach for benign and malicious web robot detection
CN115987544A (en) A network security threat prediction method and system based on threat intelligence
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
Ajagbe et al. Ensuring intrusion detection for IoT services through an improved CNN
Khan et al. Federated learning-based natural language processing: a systematic literature review
Demirel et al. Web based anomaly detection using zero-shot learning with CNN
Kasim Automatic detection of phishing pages with event-based request processing, deep-hybrid feature extraction and light gradient boosted machine model
Mehta et al. SQLIML: A comprehensive analysis for SQL injection detection using multiple supervised and unsupervised learning schemes
Panja et al. Anomaly detection in iot using extended isolation forest
Hamadouche et al. Combining Lexical, Host, and Content-based features for Phishing Websites detection using Machine Learning Models.
Oudah et al. Sql injection detection using machine learning: A review
Newaz et al. A sophisticated framework for the accurate detection of phishing websites
Gündüz et al. Feature selection and comparison of classification algorithms for intrusion detection
Sarojini et al. Detection for domain generation algorithm (DGA) domain botnet based on neural network with multi-head self-attention mechanisms
Diviya et al. An optimized phishing detection model using hybrid feature selection and a fine-tuned narrow neural network with dynamic jaya optimization to overcome cyberthreats
Fan et al. PUMD: a PU learning-based malicious domain detection framework
Shanker et al. Fss-part: Feature grouping subset model for predicting network attacks