David et al., 2020 - Google Patents
Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber securityDavid et al., 2020
View PDF- Document ID
- 12263137011811325727
- Author
- David A
- Oluwasola O
- Publication year
- Publication venue
- International Journal of Computer Science and Information Security (IJCSIS)
External Links
Snippet
Zero day attack is a form of cyber-attack that exploits the vulnerabilities of a systems, protocols, software, computer port and Networks. When vulnerabilities are detected the main target must be known. However, some attacks can be prone to unpatched vulnerabilities …
- 230000001537 neural 0 title abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12047396B2 (en) | System and method for monitoring security attack chains | |
| Jayalaxmi et al. | Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey | |
| US20230012220A1 (en) | Method for determining likely malicious behavior based on abnormal behavior pattern comparison | |
| Devi et al. | Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments | |
| Garcia-Teodoro et al. | Anomaly-based network intrusion detection: Techniques, systems and challenges | |
| David et al. | Zero day attack prediction with parameter setting using bi direction recurrent neural network in cyber security | |
| Khan et al. | A hybrid deep learning-based intrusion detection system for IoT networks | |
| Pakmehr et al. | DDoS attack detection techniques in IoT networks: a survey | |
| Babiker et al. | Web application attack detection and forensics: A survey | |
| Fallah et al. | Android malware detection using network traffic based on sequential deep learning models | |
| Soniya et al. | Intrusion detection system: Classification and techniques | |
| Gandotra et al. | Computational techniques for predicting cyber threats | |
| Beaver et al. | A learning system for discriminating variants of malicious network traffic | |
| Kavitha et al. | Intelligent intrusion detection system using enhanced arithmetic optimization algorithm with deep learning model | |
| Singh et al. | An anomaly-based intrusion detection system for IoT networks using trust factor | |
| Subramani et al. | Comprehensive review on distributed denial of service attacks in wireless sensor networks | |
| Cherfi et al. | Mlp-based intrusion detection for securing iot networks | |
| Bhandari et al. | AINIS: An Intelligent Network Intrusion System. | |
| Meganathan et al. | Security establishment using deep convolutional network model in cyber-physical systems | |
| Beulah et al. | Detection of DDoS attack using ensemble machine learning techniques | |
| Stiawan et al. | Characterizing network intrusion prevention system | |
| Molcer et al. | Machine learning based network intrusion detection system for internet of things cybersecurity | |
| Cuong et al. | A novel approach for APT detection based on ensemble learning model | |
| Sharma et al. | Advances and challenges in cryptography using artificial intelligence | |
| Srinarayani et al. | Detection of botnet traffic using deep learning approach |