2021
DOI: 10.1007/s11227-021-03715-6
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattack detection model using deep learning in a network log system with data visualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…κ is set as the stability coefficient of unstructured data visualization of social networks. When the stability coefficient takes a value in the interval κ � [2,6], the stability of unstructured data visualization of social networks is relatively high.…”
Section: Visual Stability Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…κ is set as the stability coefficient of unstructured data visualization of social networks. When the stability coefficient takes a value in the interval κ � [2,6], the stability of unstructured data visualization of social networks is relatively high.…”
Section: Visual Stability Analysismentioning
confidence: 99%
“…It can be seen from Figure 7 that when the number of iterations is 500, the stability coefficient of the social network unstructured data visualization method in reference [8] takes a value in the interval [1.5, 6.3], the stability coefficient of the social network unstructured data visualization method in reference [9] takes a value in the interval [1.8, 6.7], and the stability coefficient of the social network unstructured data visualization of the proposed method takes a value in the interval [2.1, 5.5]. It can be seen that, compared with the method of reference [8] and the method of reference [9], the stability coefficient of unstructured social network data visualization of the proposed method takes a value in the interval κ � [2,6], which can effectively improve the visualization of social network unstructured data stability.…”
Section: Visual Stability Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of external intrusion identification, Pan et al 27 designed a dynamic residual generator to detect a variety of attack methods through an entity behavioral analysis filtering device, which solved the problem of a few types of abnormal detection in static detection models. Some scholars have also established an anomaly detection model to detect Cyber attacks based on CNN 28,29 , RNN 30 , long short-term memory (LSTM) [31][32][33] , GAN 34,35 , and deep autoencoder (DAE) 36,37 . In terms of insider threat identification, the research focuses on the analysis of enterprise employee behavior 38 , user portrait 39,40 , complex behavior modeling 41 , and so on.…”
Section: Anomaly Behavior Detectionmentioning
confidence: 99%