ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8762015
|View full text |Cite
|
Sign up to set email alerts
|

Learning Latent Distribution for Distinguishing Network Traffic in Intrusion Detection System

Abstract: In this paper, we develop a new deep learning approach, Multi-distributed Variational AutoEncoder (MVAE), to enhance network intrusion detection. MVAE introduces label information of data samples into the loss function of VAE. This label information together with reconstruction error function of VAE will force each class of network data into a different region in the latent feature space of MVAE. As a result, the network traffic samples are more distinguishable in the new representation space, thereby improvin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 14 publications
0
22
0
1
Order By: Relevance
“…The popular traditional machine learning algorithms for IoT attack detection are Decision tree (C4.5), Support Vector Machine (SVM), K-Nearest Neighbour, Bayes Classifier, Neural Networks [8], [24]. Recently, the deep learning approach is widely used and achieved high performance in detecting cyberattacks [3], [9], [15]- [17]. Among, deep learning approaches, AE-based models project the original data to a new latent representation space to improve the accuracy in detection tasks [3], [15], [16].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The popular traditional machine learning algorithms for IoT attack detection are Decision tree (C4.5), Support Vector Machine (SVM), K-Nearest Neighbour, Bayes Classifier, Neural Networks [8], [24]. Recently, the deep learning approach is widely used and achieved high performance in detecting cyberattacks [3], [9], [15]- [17]. Among, deep learning approaches, AE-based models project the original data to a new latent representation space to improve the accuracy in detection tasks [3], [15], [16].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the deep learning approach is widely used and achieved high performance in detecting cyberattacks [3], [9], [15]- [17]. Among, deep learning approaches, AE-based models project the original data to a new latent representation space to improve the accuracy in detection tasks [3], [15], [16]. Nevertheless, to train a good machine learning model for detecting IoT attacks, it is usually required to label a huge volume of training data as normal or attack [24].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations