Prabu et al., 2023 - Google Patents
An automated intrusion detection and prevention model for enhanced network security and threat assessmentPrabu et al., 2023
View PDF- Document ID
- 17341667671732252196
- Author
- Prabu K
- Sudhakar P
- Publication year
- Publication venue
- Int. J. Comput. Netw. Appl
External Links
Snippet
Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real …
- 238000001514 detection method 0 title abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Siadati et al. | Detecting structurally anomalous logins within enterprise networks | |
| Asif et al. | Network intrusion detection and its strategic importance | |
| Corona et al. | Information fusion for computer security: State of the art and open issues | |
| Rakhimberdiev et al. | Prospects for the use of neural network models in the prevention of possible network attacks on modern banking information systems based on blockchain technology in the context of the digital economy | |
| Ghadge | Enhancing threat detection in Identity and Access Management (IAM) systems | |
| Kazaure et al. | Digital forensics investigation approaches in mitigating cybercrimes: A review | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Malik | Using AI for Behavioral Analytics in Cybersecurity: Detecting Anomalies and Insider Threats | |
| Wen et al. | Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning | |
| Al-Sanjary et al. | Challenges on digital cyber-security and network forensics: a survey | |
| Agrawal et al. | A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS. | |
| Qassim et al. | Strategy to Reduce False Alarms in Intrusion Detection and Prevention Systems. | |
| Rahim et al. | Improving the security of internet of things (iot) using intrusion detection system (ids) | |
| Prabu et al. | An automated intrusion detection and prevention model for enhanced network security and threat assessment | |
| Schneidewind | Metrics for mitigating cybersecurity threats to networks | |
| Hakkoymaz | Classifying database users for intrusion prediction and detection in data security | |
| Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
| Yeboah | Detecting and Safeguarding Against Cybersecurity Attacks Targeting Wireless Networks: A Comprehensive Approach to Integrate IDS/IPS, SIEM and SOAR | |
| Chell et al. | Real-time threat detection and mitigation in web api development | |
| Goonatilake et al. | Statistical quality control approaches to network intrusion detection | |
| Alguliyev et al. | CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience | |
| Azeez et al. | Cyber attack detection in a global network using machine learning approach | |
| Albassam et al. | Ransomware Detection in the Internet of Things (IoT): Challenges and Emerging Solutions | |
| CN118200022B (en) | Data encryption method and system based on malicious attacks on big data networks | |
| Yeman et al. | Artificial Intelligence in Cybersecurity for Industrial and Systems Engineering |