2023
DOI: 10.3390/electronics12132851
|View full text |Cite
|
Sign up to set email alerts
|

A New Data-Balancing Approach Based on Generative Adversarial Network for Network Intrusion Detection System

Abstract: An intrusion detection system (IDS) plays a critical role in maintaining network security by continuously monitoring network traffic and host systems to detect any potential security breaches or suspicious activities. With the recent surge in cyberattacks, there is a growing need for automated and intelligent IDSs. Many of these systems are designed to learn the normal patterns of network traffic, enabling them to identify any deviations from the norm, which can be indicative of anomalous or malicious behavior… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 29 publications
(35 reference statements)
0
5
0
Order By: Relevance
“…However, DCGAN uses deep convolutional neural networks, capturing data features better than GAN through fully connected layers, thus generating samples more effectively. Jamoos et al (2023) state that the performance of traditional machine learning methods largely depends on dataset balance. However, many IDS datasets exhibit imbalanced class distributions, making threat detection challenging in some minority classes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, DCGAN uses deep convolutional neural networks, capturing data features better than GAN through fully connected layers, thus generating samples more effectively. Jamoos et al (2023) state that the performance of traditional machine learning methods largely depends on dataset balance. However, many IDS datasets exhibit imbalanced class distributions, making threat detection challenging in some minority classes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Using one-hot coding, a mapping table was established for discrete feature data to make it ordered and continuous. The data set has eight classification results, as shown in Equation ( 3), including Normal (0), NMRI (1), CMRI (2), MSCI (3), MPCI (4), MFCI (5), DOS (6) and Recon (7). They can be encoded as (1, 0, 0, 0, 0, 0, 0, 0), (0, 1, 0, 0, 0, 0, 0, 0), (0, 0, 1, 0, 0, 0, 0, 0), (0, 0, 0, 1, 0, 0, 0, 0), (0, 0, 0, 0, 1, 0, 0, 0), (0, 0, 0, 0, 0, 1, 0, 0), (01, 0, 0, 0, 0, 0, 1, 0) and (0, 0, 0, 0, 0, 0, 0, 1).…”
Section: Gas Pipeline Industrial Data Setmentioning
confidence: 99%
“…(0, 0, 0, 0, 0, 1, 0, 0), i f the result is MFCI (5). (0, 0, 0, 0, 0, 0, 1, 0), i f the result is DOS (6). (0, 0, 0, 0, 0, 0, 0, 1), i f the result is Recon (7).…”
Section: Gas Pipeline Industrial Data Setmentioning
confidence: 99%
See 2 more Smart Citations