2021
DOI: 10.1186/s40537-021-00544-5
|View full text |Cite
|
Sign up to set email alerts
|

IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism

Abstract: Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source. Hackers commonly conduct network attacks to alter, damage, or steal private data. Intrusion detection systems (IDS) are the best and most effective techniques when it comes to tackle these threats. An IDS is a software application or hardware device that monitors traff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…BUDIHARTO W has been ranked seventh his top work includes Prediction and analysis of Indonesia Presidential election from Twitter using sentiment analysis [49], Data science approach to stock prices forecasting in Indonesia during Covid-19 using Long Short-Term Memory (LSTM) [50], GNSS-based navigation systems of autonomous drone for delivering items [51]. DOUZI K has been ranked eighth with 6 articles his top work includes GNSS-based navigation systems of autonomous drone for delivering items [52], An LSTM and GRU based trading strategy adapted to the Moroccan market [53] IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism [54], FURHT B has been ranked ninth also with 6m articles in total , his top work includes Deep Learning applications for COVID-19 [55], Text Data Augmentation for Deep Learning [56], Random forest implementation and optimization for Big Data analytics on LexisNexis's high performance computing cluster platform [57]', and VILLANUSTRE F has been ranked tenth with 6 articles which includes Deep learning applications and challenges in big data analytics [58], Random forest implementation and optimization for Big…”
Section: Table 6 -Top Authorsmentioning
confidence: 99%
“…BUDIHARTO W has been ranked seventh his top work includes Prediction and analysis of Indonesia Presidential election from Twitter using sentiment analysis [49], Data science approach to stock prices forecasting in Indonesia during Covid-19 using Long Short-Term Memory (LSTM) [50], GNSS-based navigation systems of autonomous drone for delivering items [51]. DOUZI K has been ranked eighth with 6 articles his top work includes GNSS-based navigation systems of autonomous drone for delivering items [52], An LSTM and GRU based trading strategy adapted to the Moroccan market [53] IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism [54], FURHT B has been ranked ninth also with 6m articles in total , his top work includes Deep Learning applications for COVID-19 [55], Text Data Augmentation for Deep Learning [56], Random forest implementation and optimization for Big Data analytics on LexisNexis's high performance computing cluster platform [57]', and VILLANUSTRE F has been ranked tenth with 6 articles which includes Deep learning applications and challenges in big data analytics [58], Random forest implementation and optimization for Big…”
Section: Table 6 -Top Authorsmentioning
confidence: 99%
“…The dimensional reduction process is essential in increasing performance in the PCA model. Further, to optimize the reduction, UMAP and Mutual Information (MI) were used as dimensional reduction to enhance classification tasks for IDS based on the Attention mechanism [17].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, the classifier's performance suffers because it has features that aren't good enough. The principal component analysis (PCA), mutual information (MI), chi-square, and UMAP are all multidimensional reduction frameworks that can help you get rid of a lot of information [6]. Our experiment used SDAE to make enhancement of dimensional reduction.…”
Section: Introductionmentioning
confidence: 99%