Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security 2021
DOI: 10.1145/3474369.3486869
|View full text |Cite
|
Sign up to set email alerts
|

Network Anomaly Detection Using Transfer Learning Based on Auto-Encoders Loss Normalization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Application Primary Focus Secondary Focus [38] malicious actor IDS - [39] malicious actor IDS - [40] malicious actor DDoS - [41] malicious actor SYN attack - [11] malicious actor botnet - [42] malicious actor -- [14] malicious actor -time series data [43] malicious actor malware detection - [46] malicious actor feature selection - [12] malicious actor -- [44] malicious actor IDS - [10] malicious actor IDS - [45] malicious actor IDS - [47] sensor performance water systems time series data [48] sensor performance charging system - [49] sensor performance nuclear power plant - [51] sensor performance edge connection fault detection - [15] sensor performance emergency detection - [54] time series data IIoT sensor drift - [7] time series data -- [13] time series data multivariate time series data - [55] time series data -- [57] general AD time series data multi-class detection [56] general AD automated vehicles - [58] general AD time series data energy efficiency [52] distributed AD -- [53] distributed AD time series data -…”
Section: Referencementioning
confidence: 99%
See 3 more Smart Citations
“…Application Primary Focus Secondary Focus [38] malicious actor IDS - [39] malicious actor IDS - [40] malicious actor DDoS - [41] malicious actor SYN attack - [11] malicious actor botnet - [42] malicious actor -- [14] malicious actor -time series data [43] malicious actor malware detection - [46] malicious actor feature selection - [12] malicious actor -- [44] malicious actor IDS - [10] malicious actor IDS - [45] malicious actor IDS - [47] sensor performance water systems time series data [48] sensor performance charging system - [49] sensor performance nuclear power plant - [51] sensor performance edge connection fault detection - [15] sensor performance emergency detection - [54] time series data IIoT sensor drift - [7] time series data -- [13] time series data multivariate time series data - [55] time series data -- [57] general AD time series data multi-class detection [56] general AD automated vehicles - [58] general AD time series data energy efficiency [52] distributed AD -- [53] distributed AD time series data -…”
Section: Referencementioning
confidence: 99%
“…Training Epochs [39] 24 h of data [12] 128 Leaky ReLU 50 [48] 5 threshold [54] 40 sigmoid and tanh [40] 14 ReLU 100 [49] 256 [7] sigmoid, ReLU, softplus GRU [11] 12 SeLU [42] 60 ReLU LSTM, sigmoid, softmax [41] 50 [57] 8 softmax/regression 8 [58] 50-100 leaky ReLU (AE), ReLU+Lin (VAE enc), ReLU+Sig (VAE dec) Regression 100 [13] 128 leaky ReLU, max, ReLU max, softmax, sigmoid 150 (trn), 50 (f-t) [15] 15 logarithmic 7 [51] 10 tanh, sigmoid 5-80 [28] 500 [56] 64 ReLU, tanh 200 [55] varies sigmoid, tanh [44] 40 ReLU sigmoid 100 [2] ReLU softmax [14] 128 50 (5x mean) [43] varies avg pooling, ReLU, max pooling Softmax [23] [24] sigmoid, ReLU [10] sigmoid, ReLU, Leaky ReLU, tanh softmax [45] 35 ReLU softmax 300 [52] ReLU linear 1-class Table A2. Cont.…”
Section: Reference Largest Layer Activation Function Classifier/regre...mentioning
confidence: 99%
See 2 more Smart Citations
“…4 the typical deployment of a NIDS that leverages the support of ML, which can analyze data of different types, e.g., full packet-captures (PCAP), network flows 8 (NetFlows), SMNP, or even DNS records. Specifically, with the increasing growth of modern networks, NetFlow analyses are preferred due to many advantages over traditional PCAP, such as: reduced privacy concerns, less space required for storage, and faster processing times [176].…”
Section: Machine Learning In Network Intrusion Detectionmentioning
confidence: 99%