2023
DOI: 10.3390/app13126871
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing BiLSTM Network Attack Prediction Based on Improved Gray Wolf Algorithm

Abstract: Aiming at the problems of low accuracy of network attack prediction and long response time of attack detection, bidirectional long short-term memory (BiLSTM) was used to predict network attacks. However, BiLSTM has the problems of difficulty in parameter setting and low accuracy of the prediction model. This paper first proposes the Improved Grey Wolf algorithm (IGWO) to optimize the BiLSTM (IGWO-BiLSTM). First, IGWO uses Dimension Learning Hunting (DLH) strategy to construct the wolf neighborhood. In the esta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Furthermore, some researchers have introduced intelligent optimization algorithms to enhance the performance of the proposed models, such as Particle Swarm Optimization (PSO) [37], the Grey Wolf Optimizer (GWO) [38], and the Cuckoo Search (CS) [39]. Experimental results indicate that the use of optimization algorithms can improve the predictive capability of the proposed models.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, some researchers have introduced intelligent optimization algorithms to enhance the performance of the proposed models, such as Particle Swarm Optimization (PSO) [37], the Grey Wolf Optimizer (GWO) [38], and the Cuckoo Search (CS) [39]. Experimental results indicate that the use of optimization algorithms can improve the predictive capability of the proposed models.…”
Section: Introductionmentioning
confidence: 99%
“…Skip connections are used in other neural networks, such as CNN, to fuse different data features. The neural network output features are fused by skip connections [23].…”
Section: Introductionmentioning
confidence: 99%