[go: up one dir, main page]

Rahim et al., 2022 - Google Patents

An intelligent approach for preserving the privacy and security of a smart home based on iot using logitboost techniques

Rahim et al., 2022

View PDF
Document ID
8038294009022437337
Author
Rahim A
Zhong Y
Ahmad T
Islam U
Publication year
Publication venue
Journal of Hunan University Natural Sciences

External Links

Snippet

Abstract Development and use of IoT devices have grown significantly in recent years. Many departments such as smart homes, smart healthcare, smart sports analysis, and different smart industries use IoT-based devices. In IoT devices, traffic is a very important part. IoT …
Continue reading at www.jonuns.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Charyyev et al. Iot traffic flow identification using locality sensitive hashes
Ortet Lopes et al. Towards effective detection of recent DDoS attacks: A deep learning approach
Sarwar et al. IoT network anomaly detection in smart homes using machine learning
Adebowale et al. Comparative study of selected data mining algorithms used for intrusion detection
Sahu et al. Data processing and model selection for machine learning-based network intrusion detection
Thom et al. Smart recon: Network traffic fingerprinting for iot device identification
Rahim et al. An intelligent approach for preserving the privacy and security of a smart home based on iot using logitboost techniques
Maseer et al. Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Fan et al. AutoIoT: Automatically updated IoT device identification with semi-supervised learning
Dushimimana et al. Bi-directional recurrent neural network for intrusion detection system (IDS) in the internet of things (IoT)
CN112685272B (en) An Interpretable User Behavior Anomaly Detection Method
Pandey Design and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system
Alhasan et al. A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection.
Machoke et al. Performance comparison of ensemble learning and supervised algorithms in classifying multi-label network traffic flow
Peng et al. An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach
Kumar GrMA-CNN: Integrating Spatial-Spectral Layers with Modified Attention for Botnet Detection Using Graph Convolution for Securing Networks.
Singh Real Time Intrusion Detection In Edge Computing Using Machine Learning Techniques
Li et al. An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data
Gupta et al. Unveiling anomalies: Harnessing machine learning for detection and insights
Gupta et al. Variance‐driven security optimisation in industrial IoT sensors
Chalichalamala et al. An extreme gradient boost based classification and regression tree for network intrusion detection in IoT
Khalaf et al. Detection model for ambiguous intrusion using smote and lstm for network security
Almutairi Smart Home IoT Privacy and Security Preservation via Machine Learning Techniques.
Ye et al. An LDDoS Attack Detection Method Based on Behavioral Characteristics and Stacking Mechanism.
Liu et al. Network anomaly detection system with optimized DS evidence theory