2023
DOI: 10.1016/j.neucom.2023.01.072
|View full text |Cite
|
Sign up to set email alerts
|

A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Furthermore, Tayfour et al [67] explored the use of a Deep Learning (DL) approach through a Long Short-Term Memory (DL-LSTM) architecture aimed at recognizing cyber-attacks targeting IoT and 5G networks, achieving significant accuracy improvements on the CICIDS2017 dataset and showcasing the DL model's capability in accurately identifying network intrusions. Additionally, He et al [68] developed an IDS based on a Pyramid Depthwise Separable Convolution neural network (PyDSC-IDS), which, when compared to other DL approaches, delivered superior accuracy in detecting network intrusions with minimal added complexity across various datasets including NSL-KDD, UNSW-NB15, and CICIDS2017, further highlighting the advancements and effectiveness of DL techniques in the realm of intrusion detection systems.…”
Section: Automl-enabled Autonomous Cybersecurity Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, Tayfour et al [67] explored the use of a Deep Learning (DL) approach through a Long Short-Term Memory (DL-LSTM) architecture aimed at recognizing cyber-attacks targeting IoT and 5G networks, achieving significant accuracy improvements on the CICIDS2017 dataset and showcasing the DL model's capability in accurately identifying network intrusions. Additionally, He et al [68] developed an IDS based on a Pyramid Depthwise Separable Convolution neural network (PyDSC-IDS), which, when compared to other DL approaches, delivered superior accuracy in detecting network intrusions with minimal added complexity across various datasets including NSL-KDD, UNSW-NB15, and CICIDS2017, further highlighting the advancements and effectiveness of DL techniques in the realm of intrusion detection systems.…”
Section: Automl-enabled Autonomous Cybersecurity Mechanismsmentioning
confidence: 99%
“…For instance, as described in Section IV-D, the DL-LSTM model proposed in [67] and the PyDSC-IDS model proposed in [68] achieved high accuracy and F1scores of more than 99.3% on the CICIDS2017 dataset.…”
Section: B Use Case 1: Automl-based Automated Ids 1) Experimental Setupmentioning
confidence: 99%
“…This paper proposes an improved lightweight TCN module to solve these problems. The lightweight TCN module uses depthwise separable convolution [13] instead of traditional convolution, constructs a causal dilated depth-separable convolution layer, and uses the Leaky ReLU [14]…”
Section: Multiscale Temporal Data Extraction Partmentioning
confidence: 99%
“…Furthermore, monitoring the performance of each class is imperative in order to guarantee that the model is functioning effectively across all class. However, many models lack reporting on the performance of individual classes in multi-class classification (e.g., see [6,[28][29][30][31][32]). Hence, resulting in an incomplete comprehension of the model's performance.…”
Section: Introductionmentioning
confidence: 99%