+

Alese et al., 2018 - Google Patents

A machine learning approach for information system security

Alese et al., 2018

View PDF
Document ID
9434495469147793393
Author
Alese B
Adetunmbi A
Publication year
Publication venue
International Journal of Computer Science and Information Security (IJCSIS)

External Links

Snippet

The security of information system against compromise of it confidentiality, integrity and availability is a great challenge to cyber security experts. The purpose of Intrusion Detection system is to save guard and secured an information system against the notorious activities of …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Bijone A survey on secure network: intrusion detection & prevention approaches
US11171974B2 (en) Distributed agent based model for security monitoring and response
Shurman et al. IoT denial-of-service attack detection and prevention using hybrid IDS
Ravale et al. Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function
Moustafa Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
Alazab et al. Using response action with intelligent intrusion detection and prevention system against web application malware
Kumar et al. Intrusion detection systems: a review
Wang et al. MAAC: Novel alert correlation method to detect multi-step attack
Thomas Improving intrusion detection for imbalanced network traffic
Pharate et al. Classification of intrusion detection system
Joshi et al. Admit-A five dimensional approach towards standardization of network and computer attack taxonomies
Alsanad et al. Advanced persistent threat attack detection using clustering algorithms
Sfetcu Advanced persistent threats in cybersecurity–Cyber warfare
Alese et al. A machine learning approach for information system security
Kumar et al. Intrusion detection for the Internet of Things
Georgina et al. Deception based techniques against ransomwares: A systematic review
Rani et al. Analysis of machine learning and deep learning intrusion detection system in Internet of Things network
Baniya et al. Intelligent Anomaly Detection System Based on Ensemble and Deep Learning
Sharma et al. Advances and challenges in cryptography using artificial intelligence
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Lakra HSNORT: A Hybrid intrusion detection system using artificial intelligence with snort
Alazab et al. Developing an intelligent intrusion detection and prevention system against web application malware
Zoghi Ensemble Classifier Design and Performance Evaluation for Intrusion Detection Using UNSW-NB15 Dataset
Soh Advanced persistent threat detection using anomaly score calibration and multi-class classification
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载