2023
DOI: 10.1007/s11036-023-02223-6
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Using Hybrid Convolutional Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Positive outcomes from validating the NSL-KDD Test+ dataset demonstrate that the MultiTree algorithm attains 84.2% accuracy and 85.2% adaptive voting. Compared to earlier studies, the ensemble model increases detection accuracy [18,19]. This illustrates how detection results are impacted by data quality.…”
Section: Literature Reviewmentioning
confidence: 65%
See 2 more Smart Citations
“…Positive outcomes from validating the NSL-KDD Test+ dataset demonstrate that the MultiTree algorithm attains 84.2% accuracy and 85.2% adaptive voting. Compared to earlier studies, the ensemble model increases detection accuracy [18,19]. This illustrates how detection results are impacted by data quality.…”
Section: Literature Reviewmentioning
confidence: 65%
“…Binary features (7,12,14,20,21,22) describe attributes with two states, while categorical features (2, 3, 4, 42) reflect qualitative variables with distinct categories. Discrete features (8,9,15,(23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)(35)(36)(37)(38)(39)(40)(41)43) are unique numeric variables, but continuous features (1,5,6,10,11,13,16,17,18,19) can take any real value within a range. The dataset's 'attack' label has 40 labels, categorizing attacks as revised, U2R, DoS, R2L, and probing.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…This is the primary reason for the rapid increase in cyberattacks against IoT devices [7]. Proactive network security defenses are required to protect essential assets and data because IoT attack vectors have the potential to result in successful security breaches [8].…”
Section: Introductionmentioning
confidence: 99%