Rahim et al., 2022 - Google Patents
An intelligent approach for preserving the privacy and security of a smart home based on iot using logitboost techniquesRahim et al., 2022
View PDF- Document ID
- 8038294009022437337
- Author
- Rahim A
- Zhong Y
- Ahmad T
- Islam U
- Publication year
- Publication venue
- Journal of Hunan University Natural Sciences
External Links
Snippet
Abstract Development and use of IoT devices have grown significantly in recent years. Many departments such as smart homes, smart healthcare, smart sports analysis, and different smart industries use IoT-based devices. In IoT devices, traffic is a very important part. IoT …
- 238000000034 method 0 title abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Charyyev et al. | Iot traffic flow identification using locality sensitive hashes | |
| Ortet Lopes et al. | Towards effective detection of recent DDoS attacks: A deep learning approach | |
| Sarwar et al. | IoT network anomaly detection in smart homes using machine learning | |
| Adebowale et al. | Comparative study of selected data mining algorithms used for intrusion detection | |
| Sahu et al. | Data processing and model selection for machine learning-based network intrusion detection | |
| Thom et al. | Smart recon: Network traffic fingerprinting for iot device identification | |
| Rahim et al. | An intelligent approach for preserving the privacy and security of a smart home based on iot using logitboost techniques | |
| Maseer et al. | Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges | |
| Fan et al. | AutoIoT: Automatically updated IoT device identification with semi-supervised learning | |
| Dushimimana et al. | Bi-directional recurrent neural network for intrusion detection system (IDS) in the internet of things (IoT) | |
| CN112685272B (en) | An Interpretable User Behavior Anomaly Detection Method | |
| Pandey | Design and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system | |
| Alhasan et al. | A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection. | |
| Machoke et al. | Performance comparison of ensemble learning and supervised algorithms in classifying multi-label network traffic flow | |
| Peng et al. | An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach | |
| Kumar | GrMA-CNN: Integrating Spatial-Spectral Layers with Modified Attention for Botnet Detection Using Graph Convolution for Securing Networks. | |
| Singh | Real Time Intrusion Detection In Edge Computing Using Machine Learning Techniques | |
| Li et al. | An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data | |
| Gupta et al. | Unveiling anomalies: Harnessing machine learning for detection and insights | |
| Gupta et al. | Variance‐driven security optimisation in industrial IoT sensors | |
| Chalichalamala et al. | An extreme gradient boost based classification and regression tree for network intrusion detection in IoT | |
| Khalaf et al. | Detection model for ambiguous intrusion using smote and lstm for network security | |
| Almutairi | Smart Home IoT Privacy and Security Preservation via Machine Learning Techniques. | |
| Ye et al. | An LDDoS Attack Detection Method Based on Behavioral Characteristics and Stacking Mechanism. | |
| Liu et al. | Network anomaly detection system with optimized DS evidence theory |