2020
DOI: 10.1016/j.adhoc.2020.102177
|View full text |Cite
|
Sign up to set email alerts
|

IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 153 publications
(81 citation statements)
references
References 20 publications
0
81
0
Order By: Relevance
“…The work in [ 61 ] proposed an Imbalanced Generative Adversarial Network (IGAN) for an intrusion detection model. Their approach consists of three folds, a deep neural network, feature extraction, and IGAN.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work in [ 61 ] proposed an Imbalanced Generative Adversarial Network (IGAN) for an intrusion detection model. Their approach consists of three folds, a deep neural network, feature extraction, and IGAN.…”
Section: Related Workmentioning
confidence: 99%
“…The authors detect cyber threats through an edge computing paradigm that is similar to data sources. More details of [ 61 , 62 , 63 ] as well as a comparison with the proposed approach can be found in Table 1 . The table shows the methods applied by the works and the existence of the intrusion detection process, the IoT system, and the multi attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The performance indicators for comparison include accuracy, Precision, DR, F1 score, Gmean and FPR. The intrusion detection models selected as experimental comparison objects include SAVAER-DNN [11], ResNet50 [17], GoogLeNet [17], TSE-IDS(Two-Stage Classifier Ensemble for IDS) [18], RNN-IDS (recurrent neural network) [19], DAE [20], AE [20], SCDNN [21], GAR-Forest [42], Gaussian-Bernoulli RBM [43], CGANs-DNN [44], GFBLS [45], LSTM4 [45], DAE-DFFNN [46], DT [47], SWSNM [48], IGAN-IDS [49]. To enhance the persuasiveness of the experimental results, all intrusion detection models use the same test set.…”
Section: ) Performance Comparison With Existing Instrusion Detectionmentioning
confidence: 99%
“…The UNSW-NB15 dataset is processed follow the procedure in the previous work [7]. Specifically, we use the Standard-Scaler function 1 to standardize the data, and randomly select data from the original dataset to generate training and testing sets.…”
Section: ) Unsw-nb15mentioning
confidence: 99%
“…With the massive growth in the scale of computer networks, network security has emerged as one of the major issues in computer systems and attracted worldwide attentions from industry and academia. Generally speaking, network intrusion misuse behaviors are driven by known attacks (e.g., denial-of service, worm) and anomalous activities are rooted in unknown threats (e.g., botnet, malware attack) [1]. Despite using different security applications, such as firewalls, malware prevention, data encryption, and user authentication, many organizations and enterprises still fail to defeat advanced network attacks [2].…”
Section: Introductionmentioning
confidence: 99%