2013
DOI: 10.1016/j.neucom.2012.11.050
|View full text |Cite
|
Sign up to set email alerts
|

Network anomaly detection with the restricted Boltzmann machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
145
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 332 publications
(147 citation statements)
references
References 20 publications
1
145
0
1
Order By: Relevance
“…Mostly, RBMs have been used as generative models of many types high-dimensional data including labeled or unlabeled images that represent speech, bags of words that represent documents, and user ratings of movies. Also, recently some NIDS researches has been dipping their toe into RBMs [11].…”
Section: Restricted Boltzmann Machinementioning
confidence: 99%
See 2 more Smart Citations
“…Mostly, RBMs have been used as generative models of many types high-dimensional data including labeled or unlabeled images that represent speech, bags of words that represent documents, and user ratings of movies. Also, recently some NIDS researches has been dipping their toe into RBMs [11].…”
Section: Restricted Boltzmann Machinementioning
confidence: 99%
“…While an exact computation is intractable, the gradient can be estimated using a method called contrastive divergence (CD) [11]. CD learning is highly successful and is becoming the standard learning, only runs block Gibbs sampling for k (usually k = 1 [13]) steps to approximate the second term in the log-likelihood gradient from a sample from the RBM distribution [14].…”
Section: Restricted Boltzmann Machinementioning
confidence: 99%
See 1 more Smart Citation
“…That is, an oversize security header of a SOAP message can cause the same effects of an oversize payload, where as a further adverse effect, a chained encrypted key can lend to high memory and CPU capacity consumption. Some possible solutions could be the adoption of anomaly detection techniques such as the ones proposed in [18][36]Palmieri2010737 and [37]. Nevertheless, the energy-related attacks are very difficult to be detected since they are very simple and easy to implement, but extremely difficult to stop because there is no way to distinguish between legitimate and illegitimate requests and hence no way to filter such traffic.…”
Section: Processing Power Exhaustion Dosesmentioning
confidence: 99%
“…Another reason is that several methods for anomaly detection require labeling of normal and/or abnormal behaviors that are not easy to archive [8,9]. In addition, it is not easy to choose a suitable tool for anomaly detection.…”
Section: Introductionmentioning
confidence: 99%