2022
DOI: 10.1016/j.knosys.2021.107894
|View full text |Cite
|
Sign up to set email alerts
|

A bio-inspired hybrid deep learning model for network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…In this experiment, the main attack detection approaches that are compared are hyperparameter optimization (random search (RS) [ 8 ]; annealing; the tree Parzen estimator (TPE)); machine learning (KNN and random forest (RF)) plus feature selection (information gain-based feature selection (IGFS) and correlation-based feature selection (CFS)) with RS-KNN-CFS, Anneal-KNN-CFS, TPE-KNN-CFS, RS-KNN-IGFS, Anneal-KNN-IGFS, TPE-KNN-IGFS, RS-RF-CFS, Anneal-RF-CFS, TPE-RF-CFS, RS-RF-IGFS, Anneal-RF-IGFS, TPE-RF-IGFS [ 9 , 49 , 50 ] and GMGWO-ECAE-machine learning [ 14 ]; BRA [ 15 ]; and the ADDC proposed in this article. The specific performance indicators of each attack detection approach are analyzed in Sections 5.3.1 to 5.3.3.…”
Section: Analysis Of the Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this experiment, the main attack detection approaches that are compared are hyperparameter optimization (random search (RS) [ 8 ]; annealing; the tree Parzen estimator (TPE)); machine learning (KNN and random forest (RF)) plus feature selection (information gain-based feature selection (IGFS) and correlation-based feature selection (CFS)) with RS-KNN-CFS, Anneal-KNN-CFS, TPE-KNN-CFS, RS-KNN-IGFS, Anneal-KNN-IGFS, TPE-KNN-IGFS, RS-RF-CFS, Anneal-RF-CFS, TPE-RF-CFS, RS-RF-IGFS, Anneal-RF-IGFS, TPE-RF-IGFS [ 9 , 49 , 50 ] and GMGWO-ECAE-machine learning [ 14 ]; BRA [ 15 ]; and the ADDC proposed in this article. The specific performance indicators of each attack detection approach are analyzed in Sections 5.3.1 to 5.3.3.…”
Section: Analysis Of the Experimental Resultsmentioning
confidence: 99%
“…Through comparative analysis of experiments, we found that previous detection methods generally performed poorly in terms of these two indices. For example, the latest method proposed this year is the generalized mean gray wolf optimization algorithm (GMGWO) [ 14 ]. Its overall detection precision is good on the Network Security Laboratory Knowledge Discovery in Databases (NSL-KDD) dataset.…”
Section: Introductionmentioning
confidence: 99%
“…Moizuddin and Victor [24] presented a bioinspired HDL (hybrid DL) model for identifying network intrusion detection. This IDS model was framed as a two-stage model which includes feature selection with a bio-inspired algorithm and DL based attack classification.…”
Section: Related Workmentioning
confidence: 99%
“…The performance metrics such as accuracy, precision, recall, and f1-score are evaluated for the proposed method with some existing methods. The proposed method is compared with different existing baselines such as HDL [24], HCRN [25], DCNN [26], KNN (K-nearest neighbour) [28], multi-scale convolutional neural network (MSCNN) [29], MLP [30], LSTM [31], Conv-LSTM (convolution longshort term memory) [32], and DNN (deep neural network) [33]. Fig.…”
Section: Performance Analysis On the Unsw-nb15 Datasetmentioning
confidence: 99%
“…In the literature, majority of the researchers have worked on binary classification of intrusion traffic ( Gu & Lu, 2021 ; Zhao et al, 2021 ; Rashid et al, 2022 ; Dora & Lakshmi, 2022 ) while some also worked on multi-class classification using deep learning techniques ( Chen, Fu & Zheng, 2022 ; Zhang et al, 2022 ; Abdel-Basset et al, 2021 ; Moizuddin & Jose, 2022 ). However, deep learning requires computational resources and time to train the models ( Gu & Lu, 2021 ).…”
Section: Literature Review and Related Workmentioning
confidence: 99%