[go: up one dir, main page]

Ahmadi, 2009 - Google Patents

An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP).

Ahmadi, 2009

View PDF
Document ID
11665604437892410857
Author
Ahmadi M
Publication year
Publication venue
Int. J. Netw. Secur.

External Links

Snippet

Forecasting the unknown and detecting the known threats1 and targeted attacks2 are the most concern of network security especially in large scale environment. We have presented an intrusion3 detection and prediction system using cooperative co-evolutionary immune …
Continue reading at ijns.jalaxy.com.tw (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • G08B29/188Data fusion; cooperative systems, e.g. voting among different detectors
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/12Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/183Single detectors using dual technologies
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/20Calibration, including self-calibrating arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1654Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems
    • G08B13/1663Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems using seismic sensing means
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field

Similar Documents

Publication Publication Date Title
Molina-Coronado et al. Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process
Al Shorman et al. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection
Kumar et al. Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks
Sun et al. Intrusion detection for cybersecurity of smart meters
Li et al. System statistics learning-based IoT security: Feasibility and suitability
Moustafa et al. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things
Javadpour et al. DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments
Li et al. Data fusion for network intrusion detection: a review
Le Jeune et al. Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework
Kim et al. Long short term memory recurrent neural network classifier for intrusion detection
Ahmadian Ramaki et al. A systematic review on intrusion detection based on the Hidden Markov Model
CN111669384B (en) Malicious flow detection method integrating deep neural network and hierarchical attention mechanism
Ahmad et al. Application of artificial neural network in detection of probing attacks
Krishnaveni et al. Ensemble approach for network threat detection and classification on cloud computing
Gupta An effective model for anomaly IDS to improve the efficiency
Maseer et al. Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Wu et al. Factor-analysis based anomaly detection and clustering
Tauscher et al. Learning to detect: A data-driven approach for network intrusion detection
Induru et al. Adaptive cybersecurity monitoring via semantic stream processing and GNN-based trust scoring on IPv4 logs
Bitter et al. Application of artificial neural networks and related techniques to intrusion detection
Umamaheswaran et al. RETRACTED: Smart intrusion detection system with balanced data in IoMT infra
Maiga et al. Intrusion Detection With Deep Learning Classifiers: A Synergistic Approach of Probabilistic Clustering and Human Expertise to Reduce False Alarms
Gujar AI-Enhanced Intrusion Detection Systems for Strengthening Critical Infrastructure Security
Nalavade et al. Evaluation of k-means clustering for effective intrusion detection and prevention in massive network traffic data
Melo et al. A novel immune detection approach enhanced by attack graph based correlation