2022
DOI: 10.1155/2022/8030510
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Intelligent-Based Intrusion Detection System Approach Using Deep Multilayer Classification

Abstract: Cybersecurity in information technology (IT) infrastructures is one of the most significant and complex issues of the digital era. Increases in network size and associated data have directly affected technological breakthroughs in the Internet and communication areas. Malware attacks are becoming increasingly sophisticated and hazardous as technology advances, making it difficult to detect an incursion. Detecting and mitigating these threats is a significant issue for standard analytic methods. Furthermore, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 48 publications
0
0
0
Order By: Relevance
“…5G Network Using Deep Learning is used [9], it achieves a good result in distinguishing between outside and inside attacks, but it limits and rely on the speed of the interne, if its slow, then no such efficiency in the performance. Autoencoder deep learning is used by [10], it detects anomaly attacks, but it has a limitation in the efficacy and low performance. AIS (Artificial Immune System) method is used [11], it detects the new signature, it has a limitation in using powerful hardware.…”
Section: Literature Reviewmentioning
confidence: 99%
“…5G Network Using Deep Learning is used [9], it achieves a good result in distinguishing between outside and inside attacks, but it limits and rely on the speed of the interne, if its slow, then no such efficiency in the performance. Autoencoder deep learning is used by [10], it detects anomaly attacks, but it has a limitation in the efficacy and low performance. AIS (Artificial Immune System) method is used [11], it detects the new signature, it has a limitation in using powerful hardware.…”
Section: Literature Reviewmentioning
confidence: 99%