22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedde 2017
DOI: 10.1109/cse-euc.2017.119
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(45 citation statements)
references
References 9 publications
0
41
0
Order By: Relevance
“…The number of hidden nodes is selected from PSO and PNN classifies the lower dimensional data. The outcome reveals the proposed DBN-PNN model outperforms regular PCA-PNN, PNN, and DBN-PNN (non-optimized model) [25]. The number of samples present in the dataset is not distributed evenly but still, with the available data, the model is prepared after processing the data.…”
Section: Background Studymentioning
confidence: 98%
“…The number of hidden nodes is selected from PSO and PNN classifies the lower dimensional data. The outcome reveals the proposed DBN-PNN model outperforms regular PCA-PNN, PNN, and DBN-PNN (non-optimized model) [25]. The number of samples present in the dataset is not distributed evenly but still, with the available data, the model is prepared after processing the data.…”
Section: Background Studymentioning
confidence: 98%
“…Then, the weight of the softmax layer are learned by labeled data. In attack detection, DBNs are used for both feature extraction and classification [20][21][22].…”
Section: Deep Brief Network (Dbn)mentioning
confidence: 99%
“…Commonly, network forensic applications have incorporated a number of techniques based on mathematics and machine learning, such as fuzzy logic, naïve bayes classifiers, support vector machines and neural networks [31][32][33][34]. However, contemporary research has proposed deep learning as an alternative as, long training times notwithstanding, deep models tend to outperform other solutions when tasked with processing large volumes of data [35,36,3,14,17].…”
Section: Deep Learning For Tracing and Discovering Threat Behavioursmentioning
confidence: 99%
“…Since IoT devices are designed to be continuously active, collecting traffic from such a network would result in excessive volumes of data. As such, to analyse the collected data, fast and automated methods are employed, with one prominent example being deep learning that is ideal for rapidly scanning large volumes of network data to detect patterns that indicate and attack [14][15][16][17]. However, in order to utilise a deep learning model, it first needs to be trained, which involves selecting hyperparameters, the values of which can greatly affect its performance [18,19].…”
Section: Introductionmentioning
confidence: 99%