2022
DOI: 10.37391/ijeer.100472
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for Identifying Network Intrusion in an Automated Process Control Computer System

Abstract: Technology and networks have improved significantly in recent decades, and Internet services are now available in almost every business. It has become increasingly important to develop information security technology to identify the most recent attack as hackers are getting better at stealing information. The most important technology for security is an Intrusion Detection System (IDS) which employs machine learning and deep learning technique to identify network irregularities. To detect an unknown attack, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
0
0
Order By: Relevance
“…PROPOSED METHODOLOGY The suggested method uses a neural network to analyze a CSE-CIC-IDS2018 dataset made up of modern attack vectors. This work created a method for identifying anomalous network traffic using deep learning techniques based on a hybrid CNN and LSTM model with FOA [13] [14]. Notably, the timestamp values of each network flow are included, making the dataset better realistic.…”
Section: Introductionmentioning
confidence: 99%
“…PROPOSED METHODOLOGY The suggested method uses a neural network to analyze a CSE-CIC-IDS2018 dataset made up of modern attack vectors. This work created a method for identifying anomalous network traffic using deep learning techniques based on a hybrid CNN and LSTM model with FOA [13] [14]. Notably, the timestamp values of each network flow are included, making the dataset better realistic.…”
Section: Introductionmentioning
confidence: 99%