2023
DOI: 10.1109/access.2023.3251354
|View full text |Cite
|
Sign up to set email alerts
|

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering

Abstract: Network intrusion detection is an important technology in national cyberspace security strategy and has become a research hotspot in various cyberspace security issues in recent years. The development of effective and efficient intelligent network intrusion detection methods using advanced machine learning algorithms is of great importance for defending against various network intrusions in complex network environments. In this study, a network intrusion detection method based on decision tree twin support vec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 63 publications
0
6
0
Order By: Relevance
“…The core theoretical goal of deep learning networks is to learn models from data, so that the learned models can be well applied to new samples, with strong generalization ability [18,19]. Wen et al [20] uses convolutional neural network models to construct NIDS models, reduce node data redundancy, and extract abnormal behavior sample features.…”
Section: A R T I C L Ementioning
confidence: 99%
See 1 more Smart Citation
“…The core theoretical goal of deep learning networks is to learn models from data, so that the learned models can be well applied to new samples, with strong generalization ability [18,19]. Wen et al [20] uses convolutional neural network models to construct NIDS models, reduce node data redundancy, and extract abnormal behavior sample features.…”
Section: A R T I C L Ementioning
confidence: 99%
“…10, when the dropout is 0.09, the model cannot fully learn the data features due to too many discarded network elements during training, resulting in a poor effect in reducing the loss value. When the dropout is 0.01 or 0.05, there are varying degrees of (19)…”
Section: Changes In Loss Values For Different Dropouts On Training Se...mentioning
confidence: 99%
“…Select four existing models [39][40][41][42] as comparison models. In the test, a p < 0.05 was considered to indicate statistical significance.…”
Section: Mcnemar Hypothesis Test Resultsmentioning
confidence: 99%
“…The core theoretical goal of deep learning networks is to learn models from data, so that the learned models can be well applied to new samples, with strong generalization ability [18][19]. Reference [20] uses convolutional neural network models to construct NIDS models, reduce node data redundancy, and extract abnormal behavior sample features; Reference [21] first identifies a single attack based on generating adversarial networks, and integrates multiple network models to achieve multiple types of comprehensive network monitoring; Reference [22] combines unsupervised and supervised analysis of network traffic within channels, and introduces a triple convolutional neural network (TCNN) for feature extraction; Reference [23] proposed combined the multi-classifier and recursive neural networks (MCRNN) to generate corresponding network monitoring models to achieve efficient identification and processing of network attacks.…”
Section: Related Workmentioning
confidence: 99%