Ahmad et al., 2005 - Google Patents
Intrusions detection mechanism by resilient back propagation (RPROP)Ahmad et al., 2005
View PDF- Document ID
- 6018348697633995953
- Author
- Ahmad I
- Swati S
- Mohsin S
- Publication year
- Publication venue
- European Journal of Scientific Research ISSN
External Links
Snippet
The accurate detection of computer and network system intrusions has always been an elusive aim for system administrator and information security researchers. There are several methods of responding to a network intrusion, but they all require precise identification of the …
- 238000001514 detection method 0 title abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
- G06N3/063—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmad et al. | Application of artificial neural network in detection of DOS attacks | |
Haghnegahdar et al. | A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection | |
Zhao et al. | A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things | |
Saied et al. | Detection of known and unknown DDoS attacks using Artificial Neural Networks | |
Cannady | Artificial neural networks for misuse detection | |
Ahmad et al. | Application of artificial neural network in detection of probing attacks | |
Cannady et al. | The application of artificial neural networks to misuse detection: initial results | |
Tran et al. | Deep hierarchical reinforcement agents for automated penetration testing | |
Abou El Houda et al. | A mec-based architecture to secure iot applications using federated deep learning | |
Ahmad et al. | Intrusions detection mechanism by resilient back propagation (RPROP) | |
Sharma et al. | Anomaly based network intrusion detection for IoT attacks using convolution neural network | |
Ateş et al. | Clustering based DDoS attack detection using the relationship between packet headers | |
Vo et al. | Apelid: Enhancing real-time intrusion detection with augmented wgan and parallel ensemble learning | |
Ishitaki et al. | A neural network based user identification for Tor networks: Data analysis using Friedman test | |
Qu et al. | An {Input-Agnostic} Hierarchical Deep Learning Framework for Traffic Fingerprinting | |
van der Valk et al. | Learning from a big brother-mimicking neural networks in profiled side-channel analysis | |
Ahmad et al. | Artificial neural network approaches to intrusion detection: a review | |
Kumar et al. | URL Phishing Data Analysis and Detecting Phishing Attacks using Machine Learning in NLP | |
Bhavani et al. | Phishing Websites Detection Using Machine Learning | |
Ng et al. | Dimensionality reduction for denial of service detection problems using RBFNN output sensitivity | |
Huang et al. | Deep learning modeling attack analysis for multiple fpga-based apuf protection structures | |
Kumar et al. | Intrusion detection using artificial neural network with reduced input features | |
Thanh | A novel approach for intrusion detection based on deep belief network | |
Akinwumi et al. | Detection of Distributed Denial of Service (DDoS) attacks using convolutional neural networks | |
Kumar et al. | 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network |