2022 IEEE World Conference on Applied Intelligence and Computing (AIC) 2022
DOI: 10.1109/aic55036.2022.9848865
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Multi-architectural Approach for Online Social Network Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The network defense is assured by analyzing the incoming data traffic of the network based on the signs and behavior [1]. The activities of the networks, like dynamic tendency, convolution, heterogeneity, and vagueness, are analyzed to identify the malicious activity of the network continuously [2,3]. Here, the detection of malicious activity or marking of the network intrusion is termed Intrusion detection and utilizes two different criteria in its detection process.…”
Section: Introductionmentioning
confidence: 99%
“…The network defense is assured by analyzing the incoming data traffic of the network based on the signs and behavior [1]. The activities of the networks, like dynamic tendency, convolution, heterogeneity, and vagueness, are analyzed to identify the malicious activity of the network continuously [2,3]. Here, the detection of malicious activity or marking of the network intrusion is termed Intrusion detection and utilizes two different criteria in its detection process.…”
Section: Introductionmentioning
confidence: 99%
“…An Intrusion Detection System (IDS) is a Software or Hardware system, implement to detect and prevent unauthorized access to any computer system or network [7]. IDS is in two types: to be host-based, integrated on a host device and checks process and user activity on the local machine to detect intrusion, or network-based, the most commonly used IDS established over a network and works within a network system in a distributed manner to check traffic flow for intrusions [8,9]. IDS classifies Aegean Wi-Fi Intrusion Dataset (AWID) into the most commonly four types of classes: Normal, Flooding, Injection, and Impersonation according to their behavior on the wireless network.…”
mentioning
confidence: 99%