2018 International Conference on Computing, Networking and Communications (ICNC) 2018
DOI: 10.1109/iccnc.2018.8390278
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Evaluation of Deep Learning for Network Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 51 publications
(19 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…Malaiya et al 104 proposed different IDS models based on fully connected networks, Variational AE, and Sequence‐to‐Sequence (Seq2Seq) structures, respectively. These models were examined for different datasets NSL‐KDD, KyotoHoneypot, UNSW‐NB15, IDS2017, and MAWILab traces 105 .…”
Section: Ai Methods For Nidsmentioning
confidence: 99%
“…Malaiya et al 104 proposed different IDS models based on fully connected networks, Variational AE, and Sequence‐to‐Sequence (Seq2Seq) structures, respectively. These models were examined for different datasets NSL‐KDD, KyotoHoneypot, UNSW‐NB15, IDS2017, and MAWILab traces 105 .…”
Section: Ai Methods For Nidsmentioning
confidence: 99%
“…A recurring question in deep one-class classification is how to meaningfully regularize against a feature map collapse φω ≡ c. Without regularization, minimum volume or maximum margin objectives, such as (16), (20), or (22), could be trivially solved with a constant mapping [137], [333]. Possible solutions for this include adding a reconstruction term or architectural constraints [137], [327], freezing the embedding [136], [139], [140], [142], [334], inversely penalizing the embedding variance [335], using true [144], [336], auxiliary [139], [233], [332], [337], or artificial [337] negative examples in training, pseudolabeling [152], [153], [155], [335], or integrating some manifold assumption [333].…”
Section: Deep One-class Classificationmentioning
confidence: 99%
“…We choose the OC-SVM [6] with standard RBF kernel k(x,x) = exp(−γ x −x 2 ) as a method for this task since the data is real-valued and low-dimensional, and the OC-SVM scales sufficiently well for this comparatively small data set. In addition, the ν-parameter formulation [see (20)] enables us to use our prior knowledge and, thus, approximately control the false alarm rate α and, with it, implicitly also the miss rate, which leads to our first recommendation:…”
Section: A Example 1: Thyroid Disease Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, the security situation assessment models have been effective investigated, [19][20][21][22][23][24][25][26][27] such as models based on mathematical methods, knowledge reasoning methods, and deep learning methods.…”
Section: Related Workmentioning
confidence: 99%