Method for performing cyber intrusion analysis using deep learning approach, involves classifying detected cyber-intrusion events and occurrences on real-time internet-of-things devices
2025-03-25
专利权人ANITHALAKSHMI V (ANIT-Individual) ; VIJAYAN B V (VIJA-Individual) ; INGALE K K (INGA-Individual) ; THIAGARAJAN R (THIA-Individual) ; KOTTEESWARAN R (KOTT-Individual) ; BAGGA M (BAGG-Individual) ; ASHOK R P (ASHO-Individual) ; JAISWAL A (JAIS-Individual) ; PRANATHI K (PRAN-Individual)
申请日期2025-03-25
专利号IN202541027595-A
成果简介NOVELTY - The method involves categorizing cyber intrusion analysis for better performance and accuracy using deep learning (DL) approach. Malicious attacks within real-time internet of things (IoT) devices are determined to analyze weaknesses in vulnerabilities. Digitally exposed vulnerabilities are analyzed and leveraged using a classification approach. Static internet protocol (IP) addresses are examined to determine whether cyber-attack exploits occur in the IoT devices. Detected cyber-intrusion events and occurrences are classified on real time IoT device, where the malicious attacks are categorized according to false positives and true positives. USE - Method for performing cyber intrusion analysis for real-time IoT devices e.g. sensors and actuators. ADVANTAGE - The method enables classifying cyber intrusion analysis as having significantly improved accuracy and efficiency using DL technique, and providing necessary point of view on IoT security by diagnosing vulnerabilities in the IoT devices. The IoT devices are constrained and need to be uniquely identified within computational resources since the IoT devices are lightweight, and have higher efficiency in performance. DESCRIPTION OF DRAWING(S) - The drawing shows a schematic view of a system for performing cyber intrusion analysis for real-time IoT devices.
IPC 分类号G06F-011/07 ; G06F-021/55 ; G06F-021/56 ; G06F-021/57 ; H04L-009/40
国家印度
专业领域信息技术
语种英语
成果类型专利
文献类型科技成果
条目标识符http://119.78.100.226:8889/handle/3KE4DYBR/13529
专题中国科学院新疆生态与地理研究所
作者单位
1.ANITHALAKSHMI V (ANIT-Individual)
2.VIJAYAN B V (VIJA-Individual)
3.INGALE K K (INGA-Individual)
4.THIAGARAJAN R (THIA-Individual)
5.KOTTEESWARAN R (KOTT-Individual)
6.BAGGA M (BAGG-Individual)
7.ASHOK R P (ASHO-Individual)
8.JAISWAL A (JAIS-Individual)
9.PRANATHI K (PRAN-Individual)
推荐引用方式
GB/T 7714
ANITHALAKSHMI V,VIJAYAN B V,INGALE K K,et al. Method for performing cyber intrusion analysis using deep learning approach, involves classifying detected cyber-intrusion events and occurrences on real-time internet-of-things devices. IN202541027595-A[P]. 2025.
条目包含的文件
条目无相关文件。
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。