2021
DOI: 10.1155/2021/6623554
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection Based on an Improved Long‐Short‐Term Memory Model in Combination with Multiple Spatiotemporal Structures

Abstract: Aimed at the existing problems in network intrusion detection, this paper proposes an improved LSTM combined with spatiotemporal structure for intrusion detection. The unsupervised spatiotemporal encoder is used to intelligently extract the spatial characteristics of network traffic data samples. It can not only retain the overall/nonlocal characteristics of the data samples but also extract the most essential deep features of the data samples. Finally, the extracted features are used as input of the LSTM mode… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…e error backpropagation algorithm then uses the output sensitivity of the neural network to quickly calculate the hyperparameters of the layers of the neural network, which include thresholds and weights, in order to achieve the goal of ensuring that the output values of the neural network are as close to the true values as possible [18]. Denote the training data set as (x 1 , y 1 ), (x 2 , y 2 ), .…”
Section: Mlp Classificationmentioning
confidence: 99%
“…e error backpropagation algorithm then uses the output sensitivity of the neural network to quickly calculate the hyperparameters of the layers of the neural network, which include thresholds and weights, in order to achieve the goal of ensuring that the output values of the neural network are as close to the true values as possible [18]. Denote the training data set as (x 1 , y 1 ), (x 2 , y 2 ), .…”
Section: Mlp Classificationmentioning
confidence: 99%
“…In IDS, signature-based approaches use known patterns whereas anomaly detection works for unknown patterns [6]. The IDS proposed in [7] operates hierarchically by using control systems. The local information is obtained and then the results are transferred to the upper level after review [8].…”
Section: Introductionmentioning
confidence: 99%
“…In the past few years, many IDS techniques have been presented based on various approaches, such as mathematical formulations and data mining techniques like machine learning. Poor performances are caused by the difficulty in managing the high-dimensional network traffic data by these statistical formulations and conventional machine learning models [16][17][18]. Furthermore, most existing techniques used only binary classification, such as whether it is an attack.…”
Section: Introductionmentioning
confidence: 99%