2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Sma 2019
DOI: 10.1109/bigdatasecurity-hpsc-ids.2019.00022
|View full text |Cite
|
Sign up to set email alerts
|

Predicting Network Attacks with CNN by Constructing Images from NetFlow Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 27 publications
0
23
0
Order By: Relevance
“…An interesting approach, which maps the NetFlow data to the image representation, has been presented in [13]. In order to construct the images, the authors have used such techniques as feature correlation analysis and correlation matrices.…”
Section: Related Workmentioning
confidence: 99%
“…An interesting approach, which maps the NetFlow data to the image representation, has been presented in [13]. In order to construct the images, the authors have used such techniques as feature correlation analysis and correlation matrices.…”
Section: Related Workmentioning
confidence: 99%
“…is classification method relies on statistical features or time series features and can handle encrypted and unencrypted traffic. ese methods usually use classic machine learning algorithms to process analysis [16].…”
Section: Related Workmentioning
confidence: 99%
“…ere are three main methods for detecting network traffic anomalies based on deep learning: deep Boltzmann machine [33,34], stacked autoencoder [35,36], and CNN [16,37]. Ertam and Avcı developed GA-WKELM software.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We first loaded the train, validation set. The ResNet [13] is designed to accept the images with size 224 x 224 [11] while the preprocessed images had dimension 60 x 60 x 3. So, we transformed the [13] model had 1000 output classes but, in our use case, we set output class as 1 for binary classification while for multi-class classification, we set output classes as 12.…”
Section: Attack Detectionmentioning
confidence: 99%