2023
DOI: 10.3390/sym16010042
|View full text |Cite
|
Sign up to set email alerts
|

A High-Performance Multimodal Deep Learning Model for Detecting Minority Class Sample Attacks

Li Yu,
Liuquan Xu,
Xuefeng Jiang

Abstract: A large amount of sensitive information is generated in today’s evolving network environment. Some hackers utilize low-frequency attacks to steal sensitive information from users. This generates minority attack samples in real network traffic. As a result, the data distribution in real network traffic is asymmetric, with a large number of normal traffic and a rare number of attack traffic. To address the data imbalance problem, intrusion detection systems mainly rely on machine-learning-based methods to detect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…There are relationships in existing databases, the results of knowledge and information from the process are used as a knowledge base that is useful in decision-making. KDD in data mining is often used to dig up information hidden in databases in very large quantities (Yu et al, 2023). This research design refers to the Knowledge Discovery in Database (KDD) model which has 5 stages, namely data selection, data preprocessing, transformation, data mining, and evaluation.…”
Section: Methodsmentioning
confidence: 99%
“…There are relationships in existing databases, the results of knowledge and information from the process are used as a knowledge base that is useful in decision-making. KDD in data mining is often used to dig up information hidden in databases in very large quantities (Yu et al, 2023). This research design refers to the Knowledge Discovery in Database (KDD) model which has 5 stages, namely data selection, data preprocessing, transformation, data mining, and evaluation.…”
Section: Methodsmentioning
confidence: 99%