Lightbody et al., 2022 - Google Patents
Host-based intrusion detection system for IOT using convolutional neural networksLightbody et al., 2022
- Document ID
- 3246613699601317657
- Author
- Lightbody D
- Ngo D
- Temko A
- Murphy C
- Popovici E
- Publication year
- Publication venue
- 2022 33rd Irish Signals and Systems Conference (ISSC)
External Links
Snippet
This paper proposes and analyses a lightweight Convolutional Neural Network (CNN) based anomaly detection framework for Internet of Things (IoT) devices. IoT security has become a massive concern in recent years. IoT devices form the backbone of much of the …
- 238000001514 detection method 0 title abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Habibi et al. | Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection | |
| Shurman et al. | DoS and DDoS attack detection using deep learning and IDS | |
| US10778705B1 (en) | Deep-learning-based intrusion detection method, system and computer program for web applications | |
| Krishna et al. | Intrusion detection and prevention system using deep learning | |
| Malik et al. | [Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems | |
| Lightbody et al. | Host-based intrusion detection system for IOT using convolutional neural networks | |
| Niu et al. | Identifying APT malware domain based on mobile DNS logging | |
| Shahid et al. | Anomalous communications detection in IoT networks using sparse autoencoders | |
| Ranjan et al. | Advanced threat detection in api security: Leveraging machine learning algorithms | |
| Dilraj et al. | Towards behavioral profiling based anomaly detection for smart homes | |
| Jakkani et al. | Design of a novel deep learning methodology for IoT botnet based attack detection | |
| Teixeira et al. | Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach | |
| Alyasiri et al. | Grammatical evolution for detecting cyberattacks in Internet of Things environments | |
| Hongsong et al. | Novel LDoS attack detection by Spark‐assisted correlation analysis approach in wireless sensor network | |
| Papalkar et al. | Neuro-guard: Reinforcing web security with convolutional neural networks against cross-site scripting attacks | |
| Thereza et al. | Development of intrusion detection models for iot networks utilizing ciciot2023 dataset | |
| Alzu'bi et al. | Explainable AI-Based DDoS Attacks Classification Using Deep Transfer Learning. | |
| Tadhani et al. | A survey of deep learning models, datasets, and applications for cyber attack detection | |
| Alsumaidaie et al. | An assessment of ensemble voting approaches, random forest, and decision tree techniques in detecting distributed denial of service (DDoS) attacks | |
| Mendonça et al. | An extremely lightweight approach for ddos detection at home gateways | |
| Ali et al. | Detecting conventional and adversarial attacks using deep learning techniques: A systematic review | |
| Zhu et al. | Detecting malicious domains using modified SVM model | |
| Badidová et al. | A Contribution to DDoS Attack Detection Based on Deep Neural Networks | |
| Boone et al. | A Joint Reconstruction-Triplet Loss Autoencoder Approach Towards Unseen Attack Detection in IoV Networks | |
| Woodiss-Field et al. | Towards evaluating the effectiveness of botnet detection techniques |