2022
DOI: 10.32604/csse.2022.021217
|View full text |Cite
|
Sign up to set email alerts
|

Hybridized Wrapper Filter Using Deep Neural Network for Intrusion Detection

Abstract: Huge data over the cloud computing and big data are processed over the network. The data may be stored, send, altered and communicated over the network between the source and destination. Once data send by source to destination, before reaching the destination data may be attacked by any intruders over the network. The network has numerous routers and devices to connect to internet. Intruders may attack any were in the network and breaks the original data, secrets. Detection of attack in the network became int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Supervised learning, a popular approach that uses labeled data for training, has been widely used in malware detection and classification. Various supervised learning techniques, including as decision trees [33], support vector machines [34], and deep neural networks [35], have been investigated in the context of this job. However, the application of these technologies frequently necessitates a large quantity of labeled data for each malware strain [36], resulting in timeconsuming and expensive data collecting methods [37].…”
Section: State Of the Artmentioning
confidence: 99%
“…Supervised learning, a popular approach that uses labeled data for training, has been widely used in malware detection and classification. Various supervised learning techniques, including as decision trees [33], support vector machines [34], and deep neural networks [35], have been investigated in the context of this job. However, the application of these technologies frequently necessitates a large quantity of labeled data for each malware strain [36], resulting in timeconsuming and expensive data collecting methods [37].…”
Section: State Of the Artmentioning
confidence: 99%
“…The methodologies designed for object detection to help visually-challenged people focus on directionbased access to freedom concerning mobility, orientation, barrier mitigation, and analysis. In a general context, the scenario deals with generating information regarding the environment and surrounding in textual format for visually-challenged people [8]. However, the methods still suffer from detecting complex scenarios that require multiple object detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The best-known wrapper algorithms are the genetic algorithm, recursive feature elimination, and sequential feature selection. The authors of [68] also present a hybrid version of feature selection method that uses both filter and wrapper techniques. The embedded method combines the efficiency of unsupervised and supervised methods.…”
Section: Feature Selectionmentioning
confidence: 99%