[go: up one dir, main page]

David et al., 2020 - Google Patents

Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security

David et al., 2020

View PDF
Document ID
12263137011811325727
Author
David A
Oluwasola O
Publication year
Publication venue
International Journal of Computer Science and Information Security (IJCSIS)

External Links

Snippet

Zero day attack is a form of cyber-attack that exploits the vulnerabilities of a systems, protocols, software, computer port and Networks. When vulnerabilities are detected the main target must be known. However, some attacks can be prone to unpatched vulnerabilities …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
US12047396B2 (en) System and method for monitoring security attack chains
Jayalaxmi et al. Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey
US20230012220A1 (en) Method for determining likely malicious behavior based on abnormal behavior pattern comparison
Devi et al. Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
Garcia-Teodoro et al. Anomaly-based network intrusion detection: Techniques, systems and challenges
David et al. Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security
Khan et al. A hybrid deep learning-based intrusion detection system for IoT networks
Pakmehr et al. DDoS attack detection techniques in IoT networks: a survey
Babiker et al. Web application attack detection and forensics: A survey
Fallah et al. Android malware detection using network traffic based on sequential deep learning models
Soniya et al. Intrusion detection system: Classification and techniques
Gandotra et al. Computational techniques for predicting cyber threats
Beaver et al. A learning system for discriminating variants of malicious network traffic
Kavitha et al. Intelligent intrusion detection system using enhanced arithmetic optimization algorithm with deep learning model
Singh et al. An anomaly-based intrusion detection system for IoT networks using trust factor
Subramani et al. Comprehensive review on distributed denial of service attacks in wireless sensor networks
Cherfi et al. Mlp-based intrusion detection for securing iot networks
Bhandari et al. AINIS: An Intelligent Network Intrusion System.
Meganathan et al. Security establishment using deep convolutional network model in cyber-physical systems
Beulah et al. Detection of DDoS attack using ensemble machine learning techniques
Stiawan et al. Characterizing network intrusion prevention system
Molcer et al. Machine learning based network intrusion detection system for internet of things cybersecurity
Cuong et al. A novel approach for APT detection based on ensemble learning model
Sharma et al. Advances and challenges in cryptography using artificial intelligence
Srinarayani et al. Detection of botnet traffic using deep learning approach