2021
DOI: 10.3233/jifs-210863
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection algorithm based on image enhanced convolutional neural network

Abstract: Intrusion Detection System (IDS) can reduce the losses caused by intrusion behaviors and protect users’ information security. The effectiveness of IDS depends on the performance of the algorithm used in identifying intrusions. And traditional machine learning algorithms are limited to deal with the intrusion data with the characteristics of high-dimensionality, nonlinearity and imbalance. Therefore, this paper proposes an Intrusion Detection algorithm based on Image Enhanced Convolutional Neural Network (ID-IE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The Softmax function was used rather than the Euclidean Radial Basis Function adopted in LeNet-5, because Softmax can be well applied to multi-classification problems and has better probability distribution characteristics. A Tanh activation function was chosen instead of Relu because Relu considers eigenvalues less than zero as zero, which will lose some original information of samples and increase the sparsity of the network [51]. A categorical-cross entropy loss function integrated with an adaptive moment estimation (Adam) optimizer was employed to improve training [52].…”
Section: Modeling Methodsmentioning
confidence: 99%
“…The Softmax function was used rather than the Euclidean Radial Basis Function adopted in LeNet-5, because Softmax can be well applied to multi-classification problems and has better probability distribution characteristics. A Tanh activation function was chosen instead of Relu because Relu considers eigenvalues less than zero as zero, which will lose some original information of samples and increase the sparsity of the network [51]. A categorical-cross entropy loss function integrated with an adaptive moment estimation (Adam) optimizer was employed to improve training [52].…”
Section: Modeling Methodsmentioning
confidence: 99%
“…Year Model Dataset Classification Performance [17] CNN KDD Binary DR=97.66 [18] CNN ISCX2012 Multiclass Acc=99.69 [19] RNN NSLKDD Multiclass Acc=83.28 [20] LSTM NSLKDD Binary Acc=98.85 [21] LSTM AWID Binary Acc =98.22 [22] BiLSTM UNSW-NB15 Binary Acc=95.71 [23] DBN NSLKDD Multiclass Acc=82.08 [24] BGRU+MLP KDD99 Multiclass Acc=99.84 [24] BGRU+MLP NSLKDD Multiclass Acc=99.24 [25] RNN NSLKDD Multiclass Acc=81.29 [26] LSTM NSLKDD Multiclass Acc=89.00 [27] LSTM NSLKDD Multiclass Acc=73.18 [27] CNN NSLKDD Multiclass Acc=80.13 [28] LSTM ISCX2012 Binary Acc =99.99 [29] LSTM, GRU Personal Dataset Multiclass Acc =96.08 [30] GRU Personal Dataset Multiclass Acc=95.60 [31] GRU Personal Dataset Multiclass F1 =80.30 [32] RNN BoT-IoT Multiclass Acc =98.20 [33] CNN NSLKDD Binary Acc =99.67 [34] CNN NSLKDD Multiclass Acc=89.41 [35] DNN KDD99 Multiclass Acc=92.90 [35] DNN KDD99 Binary Acc=93.00 [36] DNN UNSW-NB15 Binary Acc=99.19 [36] DNN UNSW-NB15 Multiclass Acc=97.04 [36] DNN CICIDS2017 Binary Acc=97.73 [37] CNN-LSTM NSLKDD Binary Acc=98.90 [38] LSTM KDD99 Binary Acc=99.43 [38] GRU KDD99 Binary Acc=99.06 [38] Bi-LSTM KDD99 Binary Acc=82.20 [39] GRU NSLKDD Binary Acc=82.87 [40] GRU Gas Pipeline Binary Acc=91.70 [16] GRU ISCX 2012 Binary Acc=99.90 [41] DNN BoT-IoT Multiclass Acc=98.09 [42] CNN-LSTM CISC-2010 Binary Acc=91.54 [42] CNN-LSTM CICISC-2017 Binary Acc=93.00 [43] CNN-LSTM CICIDS2017 Binary Acc=99.03…”
Section: Articlementioning
confidence: 99%
“…Wang et al applied cloud data to texture optimization of object surfaces. The unit quaternion method was used to solve for the orientation elements of the image to achieve texture optimality and compensate for the occluded area [17]. Chambers et al used a new frame feature point matching algorithm based on FPGA technology to extract from edge feature points and then perform edge feature point matching by computing feature descriptors [18].…”
Section: Related Workmentioning
confidence: 99%