2018
DOI: 10.1109/access.2018.2867564
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
112
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 258 publications
(113 citation statements)
references
References 28 publications
0
112
0
1
Order By: Relevance
“…The LSTM algorithm has good performance at capturing long-term dependencies within a sequence. It is therefore suitable for many industrial applications [25]. The LSTM algorithm's performance has been proved in dealing with time series data [26], thanks to its excellent handling of the long-term dependency issue [27].…”
Section: Introductionmentioning
confidence: 99%
“…The LSTM algorithm has good performance at capturing long-term dependencies within a sequence. It is therefore suitable for many industrial applications [25]. The LSTM algorithm's performance has been proved in dealing with time series data [26], thanks to its excellent handling of the long-term dependency issue [27].…”
Section: Introductionmentioning
confidence: 99%
“…Precision: say the right intrusion estimate fraction with predictable overall intrusions as in (11) Recall: say the allowed intrusion estimate fraction separated by the full amount of valid intrusion possibilities in the test set in (12).…”
Section: Evaluation Discussionmentioning
confidence: 99%
“…NSL-KDD [7] is a data set that is planned to resolve some of KDD99's key difficulties. The attacks in NSLKDD are classified mainly into four types as in Table I [11]. The protocol types in the dataset are shown in the Table II. Preprocessing can be performed to remove symbolic characteristics in the procedure of identification.…”
Section: Proposed Researchmentioning
confidence: 99%
“…Many scholars used GBDT to deal with network traffic [37]- [41], and get a great result. Hao et al [34] and Xu et al [35] used GRU to utilize the temporal relationship of network flow, however, GRU is a version of RNN model which focuses on the inner long-term temporal relationship in dataflow but have a relatively poor ability to catch spatial information. Therefore, we hope to propose a method to comprehensively utilize the spatial-temporal features of network data to complete intrusion detection with good performance.…”
Section: Related Work a Intrusion Detection Techniquesmentioning
confidence: 99%