2022
DOI: 10.1016/j.eij.2021.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…To analyze cyber threat data, the authors in [1] presented the Principal Component ANALYSIS (PCA) with DNN Model, which is based on DNN and PCA. By using DNN-PCA and only 12 features from the dataset, they were able to reduce the training time by half while maintaining the accuracy rate.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…To analyze cyber threat data, the authors in [1] presented the Principal Component ANALYSIS (PCA) with DNN Model, which is based on DNN and PCA. By using DNN-PCA and only 12 features from the dataset, they were able to reduce the training time by half while maintaining the accuracy rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The feature set size is then attempted to be decreased by iteratively creating new feature subsets. The prediction accuracy in each iteration is assessed using the Mean Absolute Error (MAE) which is shown in Equation (1), and the set of characteristics with the lowest average score based on MAE is chosen for the set of characteristics chosen. The features associated with the lowest feature importance are then removed after each iteration of feature subset computation and sorting of feature significance.…”
Section: Xgboost Algorithmmentioning
confidence: 99%
“…Intelligent detection systems (IDSs) rely mainly on the following machine learning techniques: statistical-based techniques, such as Naïve Bayes [21], [22], anomaly-based techniques, such as [23], [24], [25], neural networks [26], [27], [28], deep neural networks [29], and customized clustering techniques [30], [31]. The use of artificial neural networks (ANNs) has become the most effective IDS method in network security [28], whereas the most successful applications of neural networks are in classification or categorization and pattern recognition [32].…”
Section: B Ids Traffic Classificationmentioning
confidence: 99%
“…It is now established that high offline precision, does not necessarily translate into accurate functional control of a physical prosthesis. In this sense, several recent studies have shown the discrepancy between "on and offline" in performance metrics [7][8][9][10][11]. However, very few studies have published validation results of pattern recognition in terms, and even fewer in clinical settings, relating the variability of the signal and the performance of the classifiers with those parameters related to amputation (disability index, length remaining limb, amputation time, phantom limb sensation, etc.)…”
Section: Introductionmentioning
confidence: 99%