[go: up one dir, main page]

Prabu et al., 2023 - Google Patents

An automated intrusion detection and prevention model for enhanced network security and threat assessment

Prabu et al., 2023

View PDF
Document ID
17341667671732252196
Author
Prabu K
Sudhakar P
Publication year
Publication venue
Int. J. Comput. Netw. Appl

External Links

Snippet

Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real …
Continue reading at mail.ijcna.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Siadati et al. Detecting structurally anomalous logins within enterprise networks
Asif et al. Network intrusion detection and its strategic importance
Corona et al. Information fusion for computer security: State of the art and open issues
Rakhimberdiev et al. Prospects for the use of neural network models in the prevention of possible network attacks on modern banking information systems based on blockchain technology in the context of the digital economy
Ghadge Enhancing threat detection in Identity and Access Management (IAM) systems
Kazaure et al. Digital forensics investigation approaches in mitigating cybercrimes: A review
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Malik Using AI for Behavioral Analytics in Cybersecurity: Detecting Anomalies and Insider Threats
Wen et al. Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning
Al-Sanjary et al. Challenges on digital cyber-security and network forensics: a survey
Agrawal et al. A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS.
Qassim et al. Strategy to Reduce False Alarms in Intrusion Detection and Prevention Systems.
Rahim et al. Improving the security of internet of things (iot) using intrusion detection system (ids)
Prabu et al. An automated intrusion detection and prevention model for enhanced network security and threat assessment
Schneidewind Metrics for mitigating cybersecurity threats to networks
Hakkoymaz Classifying database users for intrusion prediction and detection in data security
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Yeboah Detecting and Safeguarding Against Cybersecurity Attacks Targeting Wireless Networks: A Comprehensive Approach to Integrate IDS/IPS, SIEM and SOAR
Chell et al. Real-time threat detection and mitigation in web api development
Goonatilake et al. Statistical quality control approaches to network intrusion detection
Alguliyev et al. CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience
Azeez et al. Cyber attack detection in a global network using machine learning approach
Albassam et al. Ransomware Detection in the Internet of Things (IoT): Challenges and Emerging Solutions
CN118200022B (en) Data encryption method and system based on malicious attacks on big data networks
Yeman et al. Artificial Intelligence in Cybersecurity for Industrial and Systems Engineering