Proceedings of the 2nd International Conference on Machine Learning and Soft Computing 2018
DOI: 10.1145/3184066.3184089
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of intrusion detection system using convolutional neural network for DoS detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…Due to the capacity of learning features automatically by deep learning, researchers apply deep learning to intrusion detection to resolve the characteristic dependence problem mentioned above. Nguyen et al [19] [20] modeled network traffic as time-series, in a predefined time range with supervised learning methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the capacity of learning features automatically by deep learning, researchers apply deep learning to intrusion detection to resolve the characteristic dependence problem mentioned above. Nguyen et al [19] [20] modeled network traffic as time-series, in a predefined time range with supervised learning methods.…”
Section: Related Workmentioning
confidence: 99%
“…Precision is defined as (19), which is the fraction of relevant samples between the retrieved samples:…”
Section: A Cnn-based Worm Detectionmentioning
confidence: 99%
“…IDS can be compared with a spam filter, which raises an alarm if specific things occur. 5,6 Elsewhere, Gaspar et al 7 reviewed the strategies used to improve the classification performance in term of accuracy of support vector machines (SVMs) and performed some experiments to study the influence of features and hyperparameters in the optimization process, using kernels function. Huang et al provided a study on the joint optimization of C and g parameters (using the RBF kernel), and feature selection using grid search and genetic algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…In other words, IDS is a device, typically a designated computer system, which monitors the activity to identify malicious or suspicious alerts. IDS can be compared with a spam filter, which raises an alarm if specific things occur 5,6 …”
Section: Introductionmentioning
confidence: 99%
“…For specific types of attacks, such as DOS [74][75][76][77][78][79], botnet [80], and phishing web [81], proper feature must be extracted according to the attack characteristics that can be abstracted using domain knowledge.…”
mentioning
confidence: 99%