Khanday et al., 2022 - Google Patents
Intrusion Detection Systems for Trending CyberattacksKhanday et al., 2022
- Document ID
- 2248652093270849459
- Author
- Khanday S
- Fatima H
- Rakesh N
- Publication year
- Publication venue
- Advancing Computational Intelligence Techniques for Security Systems Design
External Links
Snippet
In this age of communication, a great deal of effort has gone into filtering out known intrusions, malwares, exploits, and vulnerabilities within digital systems. As a result, intrusion detection is essential and a key component to ensure secure data communication and flow …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kizza | System intrusion detection and prevention | |
| Cazorla et al. | Cyber stealth attacks in critical information infrastructures | |
| US7890612B2 (en) | Method and apparatus for regulating data flow between a communications device and a network | |
| Sandhu et al. | A survey of intrusion detection & prevention techniques | |
| Abbas et al. | Subject review: Intrusion detection system (IDS) and intrusion prevention system (IPS) | |
| Altwairqi et al. | Four most famous cyber attacks for financial gains | |
| Mubeen et al. | Strategies to Avoid Illegal Data Access | |
| Innab et al. | Hybrid system between anomaly based detection system and honeypot to detect zero day attack | |
| CA2587867C (en) | Network security device | |
| Adeleke | Intrusion detection: issues, problems and solutions | |
| Aijaz et al. | Security operations center—A need for an academic environment | |
| Gao et al. | Research on the main threat and prevention technology of computer network security | |
| Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
| Berchi et al. | Security issues in cloud-based iot systems | |
| Uyyala | Multilevel authentication system using hierarchical intrusion detection architecture for online banking | |
| Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
| Parekh et al. | Approach for intrusion detection system using data mining | |
| Kishore et al. | Intrusion detection system a need | |
| Vakil et al. | Cyber Attacks: Detection and Prevention | |
| Sandhu et al. | A study of the novel approaches used in intrusion detection and prevention systems | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| McGee et al. | How to counter cybercrime intrusions | |
| Aloffi et al. | Real time network security intrusions and risk management: a survey | |
| Kaskar et al. | A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set | |
| Kanika | Security of network using Ids and firewall |