2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2017
DOI: 10.1109/icacci.2017.8126009
|View full text |Cite
|
Sign up to set email alerts
|

Applying convolutional neural network for network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
175
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 424 publications
(176 citation statements)
references
References 12 publications
1
175
0
Order By: Relevance
“…Use of 1D-CNN as compared to other ML methods is becoming popular because of its good feature extraction ability. Vinayakumar et al used 1D-CNN in combination with RNN, LSTM and gated recurrent units for intrusion detection in network traffic[231]. They evaluated performance of the proposed models on KDDCup 99 dataset consisting of network traffic of TCP/IP packets and 49 showed that CNN significantly surpasses the performance of classical ML models.…”
mentioning
confidence: 99%
“…Use of 1D-CNN as compared to other ML methods is becoming popular because of its good feature extraction ability. Vinayakumar et al used 1D-CNN in combination with RNN, LSTM and gated recurrent units for intrusion detection in network traffic[231]. They evaluated performance of the proposed models on KDDCup 99 dataset consisting of network traffic of TCP/IP packets and 49 showed that CNN significantly surpasses the performance of classical ML models.…”
mentioning
confidence: 99%
“…This algorithm was earlier explored for sense disambiguation of a native language (Tamil), having rich feature representation presented in his work by Anand Kumar et al (2014a), and is also implemented in his work (2014b). A simple one dimension convolution neural networks model is also illustrated upon, based on the works by Vinayakumar et al (2017). The CNN model is fixed on an empirical method where the representation is convoluted with twenty filters, of size three, on a batch size of sixty-four, with activation ReLU over a wayward ten epochs, which are flattened and reduced to thirty-two and later to one at the final layer for evaluation.…”
Section: Methodsologymentioning
confidence: 99%
“…CNN-based anomaly detection methods have been mainly applied to intrusion detection [60,61] by preprocessing data samples with float and integer attributes into an image form convenient for CNN processing. In a more recent study, Kwon et al [62] assess several CNN architectures for anomaly detection using different network traffic datasets by comparing their performance to other techniques including Variational Autoencoders (VAE), Fully Connected Networks (FCN) [84] and LSTM.…”
Section: Recent Advances In Convolutional Neural Networkmentioning
confidence: 99%