[go: up one dir, main page]

Lightbody et al., 2022 - Google Patents

Host-based intrusion detection system for IOT using convolutional neural networks

Lightbody et al., 2022

Document ID
3246613699601317657
Author
Lightbody D
Ngo D
Temko A
Murphy C
Popovici E
Publication year
Publication venue
2022 33rd Irish Signals and Systems Conference (ISSC)

External Links

Snippet

This paper proposes and analyses a lightweight Convolutional Neural Network (CNN) based anomaly detection framework for Internet of Things (IoT) devices. IoT security has become a massive concern in recent years. IoT devices form the backbone of much of the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Habibi et al. Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection
Shurman et al. DoS and DDoS attack detection using deep learning and IDS
US10778705B1 (en) Deep-learning-based intrusion detection method, system and computer program for web applications
Krishna et al. Intrusion detection and prevention system using deep learning
Malik et al. [Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems
Lightbody et al. Host-based intrusion detection system for IOT using convolutional neural networks
Niu et al. Identifying APT malware domain based on mobile DNS logging
Shahid et al. Anomalous communications detection in IoT networks using sparse autoencoders
Ranjan et al. Advanced threat detection in api security: Leveraging machine learning algorithms
Dilraj et al. Towards behavioral profiling based anomaly detection for smart homes
Jakkani et al. Design of a novel deep learning methodology for IoT botnet based attack detection
Teixeira et al. Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach
Alyasiri et al. Grammatical evolution for detecting cyberattacks in Internet of Things environments
Hongsong et al. Novel LDoS attack detection by Spark‐assisted correlation analysis approach in wireless sensor network
Papalkar et al. Neuro-guard: Reinforcing web security with convolutional neural networks against cross-site scripting attacks
Thereza et al. Development of intrusion detection models for iot networks utilizing ciciot2023 dataset
Alzu'bi et al. Explainable AI-Based DDoS Attacks Classification Using Deep Transfer Learning.
Tadhani et al. A survey of deep learning models, datasets, and applications for cyber attack detection
Alsumaidaie et al. An assessment of ensemble voting approaches, random forest, and decision tree techniques in detecting distributed denial of service (DDoS) attacks
Mendonça et al. An extremely lightweight approach for ddos detection at home gateways
Ali et al. Detecting conventional and adversarial attacks using deep learning techniques: A systematic review
Zhu et al. Detecting malicious domains using modified SVM model
Badidová et al. A Contribution to DDoS Attack Detection Based on Deep Neural Networks
Boone et al. A Joint Reconstruction-Triplet Loss Autoencoder Approach Towards Unseen Attack Detection in IoV Networks
Woodiss-Field et al. Towards evaluating the effectiveness of botnet detection techniques