2020
DOI: 10.1007/978-3-030-57805-3_38
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 16 publications
1
12
0
Order By: Relevance
“…However, LSTM model is considered to be slow in attack detection due to sequential computation such a model utilized in several layers. Dutta et al [28] proposed a hybrid detection model for network intrusion detection system. The proposed work utilized a Classical Auto Encoder (CAE) technique along with a Deep Neural Network (DNN) model.…”
Section: Related Workmentioning
confidence: 99%
“…However, LSTM model is considered to be slow in attack detection due to sequential computation such a model utilized in several layers. Dutta et al [28] proposed a hybrid detection model for network intrusion detection system. The proposed work utilized a Classical Auto Encoder (CAE) technique along with a Deep Neural Network (DNN) model.…”
Section: Related Workmentioning
confidence: 99%
“…Dutta et al [42] introduced a hybrid model for improving the classification metrics in a NIDS. The literature applies a deep neural network for enhancing classification accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Classification algorithms such as logistic regression, k-nearest neighbor algorithm, decision tree, and support vector machine are commonly used. More recently, several hybrid classification models were proposed [3][4][5]. However, in most cases, labeling data manually is highly time-consuming and inefficient.…”
Section: Network Anomaly Traffic Detection Approachesmentioning
confidence: 99%
“…Characterization of network anomaly traffic is one of the key technologies commonly used to model and detect network anomalies and then to raise the cybersecurity awareness capability of network administrators. e existing approaches of network anomaly detection can be mainly classified into six categories [1]: classification-based methods [2][3][4], clustering-based methods [5][6][7][8][9], statistical methods [10,11], stochastic methods [12,13], deep-learning-based methods [14][15][16][17], and others [18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%