2020
DOI: 10.1155/2020/6660489
|View full text |Cite|
|
Sign up to set email alerts
|

Adaptive Anomaly Detection Framework Model Objects in Cyberspace

Abstract: Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monitoring of computers and networks is too complicated for network administrators. Hence, network security represents one of the biggest serious challenges that can be faced by network security communities. Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. The purpose of this research is to propose a me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

3
7

Authors

Journals

citations
Cited by 37 publications
(21 citation statements)
references
References 39 publications
1
20
0
Order By: Relevance
“…In the NSL-KDD dataset, our LSTM-RNN beats models that utilize all 41 features for training and testing. When compared to previously implemented deep learning methods in Alkahtani et al [22], Tang et al [15], Niyaz et al [23], Ugwu et al [11], the proposed model of LSTM-RNN did very well on the evaluation of the test data. This comparison demonstrates how our method's clear phases are predictable, accurate, effective, and authoritative.…”
Section: Comparison Of Related Workmentioning
confidence: 89%
“…In the NSL-KDD dataset, our LSTM-RNN beats models that utilize all 41 features for training and testing. When compared to previously implemented deep learning methods in Alkahtani et al [22], Tang et al [15], Niyaz et al [23], Ugwu et al [11], the proposed model of LSTM-RNN did very well on the evaluation of the test data. This comparison demonstrates how our method's clear phases are predictable, accurate, effective, and authoritative.…”
Section: Comparison Of Related Workmentioning
confidence: 89%
“…The input gate refreshes the cells, and the hidden state in the LSTM is always determined by the output gate. In addition, LSTM incorporates an embedded memory block and gate structure that allow it to solve both the disappearing and the implosion-gradient difficulties in the RNN learning process [ 51 ]. The structure of the LSTM technique can be seen in Figure 5 .…”
Section: Methodsmentioning
confidence: 99%
“…These layers provide the ResNet more efficiency and accuracy. ResNet transfer learning models are similar to VGG net [39] but are eight times deeper [40][41][42][43][44][45]; the ResNet 50 consists of 49 convolutional layers and a fully-connected layer at the end of the network and was more appropriate for classifying COVID-19. Tab.…”
Section: Deep Learning Algorithmmentioning
confidence: 99%