2022
DOI: 10.1016/j.compeleceng.2022.108455
|View full text |Cite
|
Sign up to set email alerts
|

The sound of intrusion: A novel network intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Security of communication can be provided by using various methods including access control [53], optimization-based secure routing techniques [54], agent-based methods [55], temporal analysis [56], intrusion detection techniques developed for feature selection and classifcation, key management techniques, encryption and decryption methods, trust management techniques, frewalls, and application considerations [57][58][59][60][61][62][63][64][65]. Various authors have proposed a variety of mechanisms for providing security in IoT environments through IDS.…”
Section: Literature Surveymentioning
confidence: 99%
“…Security of communication can be provided by using various methods including access control [53], optimization-based secure routing techniques [54], agent-based methods [55], temporal analysis [56], intrusion detection techniques developed for feature selection and classifcation, key management techniques, encryption and decryption methods, trust management techniques, frewalls, and application considerations [57][58][59][60][61][62][63][64][65]. Various authors have proposed a variety of mechanisms for providing security in IoT environments through IDS.…”
Section: Literature Surveymentioning
confidence: 99%
“…𝐶𝐸(𝑝, 𝑦) = 𝐶𝐸(𝑝) = − log(𝑝) (13) In intrusion detection datasets, there is an imbalance in the different categories of data, with normal traffic samples being much more abundant than other types of attack samples. Negative samples account for the dominant part of the total loss.…”
Section: E Loss Functionmentioning
confidence: 99%
“…In contrast, the convolution module [13] uses deformable convolution to enlarge the receptive field of each patch without increasing the convolution kernel. The model uses a hierarchical focal loss function to assign weights to samples with different categories [14].…”
Section: Introductionmentioning
confidence: 99%
“…However, no new methods have been proposed that can effectively improve NID performance. By treating network traffic as vibrations, waves, or sounds, Aldarwbi et al (2022) transformed network traffic features into waveforms, and based on this, implemented NID using deep learning technology based on audio/speech recognition, proposing a new NID system called "Voice of Intrusion." In response to the problem of signature recognition, Chellammal et al (2023) proposed a deep learning based NID model by combining multiple hidden processing layers in the network to form a multi-layer deep learning network.…”
Section: Nidmentioning
confidence: 99%