Ahmadi, 2009 - Google Patents
An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP).Ahmadi, 2009
View PDF- Document ID
- 11665604437892410857
- Author
- Ahmadi M
- Publication year
- Publication venue
- Int. J. Netw. Secur.
External Links
Snippet
Forecasting the unknown and detecting the known threats1 and targeted attacks2 are the most concern of network security especially in large scale environment. We have presented an intrusion3 detection and prediction system using cooperative co-evolutionary immune …
- 210000000987 Immune System 0 title abstract description 57
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/185—Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
- G08B29/188—Data fusion; cooperative systems, e.g. voting among different detectors
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/12—Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/183—Single detectors using dual technologies
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/20—Calibration, including self-calibrating arrangements
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/16—Actuation by interference with mechanical vibrations in air or other fluid
- G08B13/1654—Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems
- G08B13/1663—Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems using seismic sensing means
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/009—Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2491—Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Molina-Coronado et al. | Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process | |
| Al Shorman et al. | Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection | |
| Kumar et al. | Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks | |
| Sun et al. | Intrusion detection for cybersecurity of smart meters | |
| Li et al. | System statistics learning-based IoT security: Feasibility and suitability | |
| Moustafa et al. | An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things | |
| Javadpour et al. | DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments | |
| Li et al. | Data fusion for network intrusion detection: a review | |
| Le Jeune et al. | Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework | |
| Kim et al. | Long short term memory recurrent neural network classifier for intrusion detection | |
| Ahmadian Ramaki et al. | A systematic review on intrusion detection based on the Hidden Markov Model | |
| CN111669384B (en) | Malicious flow detection method integrating deep neural network and hierarchical attention mechanism | |
| Ahmad et al. | Application of artificial neural network in detection of probing attacks | |
| Krishnaveni et al. | Ensemble approach for network threat detection and classification on cloud computing | |
| Gupta | An effective model for anomaly IDS to improve the efficiency | |
| Maseer et al. | Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges | |
| Wu et al. | Factor-analysis based anomaly detection and clustering | |
| Tauscher et al. | Learning to detect: A data-driven approach for network intrusion detection | |
| Induru et al. | Adaptive cybersecurity monitoring via semantic stream processing and GNN-based trust scoring on IPv4 logs | |
| Bitter et al. | Application of artificial neural networks and related techniques to intrusion detection | |
| Umamaheswaran et al. | RETRACTED: Smart intrusion detection system with balanced data in IoMT infra | |
| Maiga et al. | Intrusion Detection With Deep Learning Classifiers: A Synergistic Approach of Probabilistic Clustering and Human Expertise to Reduce False Alarms | |
| Gujar | AI-Enhanced Intrusion Detection Systems for Strengthening Critical Infrastructure Security | |
| Nalavade et al. | Evaluation of k-means clustering for effective intrusion detection and prevention in massive network traffic data | |
| Melo et al. | A novel immune detection approach enhanced by attack graph based correlation |