2017 International Symposium on Networks, Computers and Communications (ISNCC) 2017
DOI: 10.1109/isncc.2017.8072036
|View full text |Cite
|
Sign up to set email alerts
|

A multi-layer perceptron approach for flow-based anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 17 publications
0
12
0
1
Order By: Relevance
“…[24,57,91]. Multi-layer perceptron (MLP) [163], convolutional neural network (CNN) [164], recurrent neural network (RNN) and long-shortterm memory (LSTM) are the popular approaches used in deep learning modeling [23,124,164]. In these deeplearning models, many hidden layers can be used to complete the overall computing process.…”
Section: Machine Learning-based Modelingmentioning
confidence: 99%
“…[24,57,91]. Multi-layer perceptron (MLP) [163], convolutional neural network (CNN) [164], recurrent neural network (RNN) and long-shortterm memory (LSTM) are the popular approaches used in deep learning modeling [23,124,164]. In these deeplearning models, many hidden layers can be used to complete the overall computing process.…”
Section: Machine Learning-based Modelingmentioning
confidence: 99%
“…A multi-layer perceptron-based feedforward neural network for detecting intrusion with sigmoid activation function and backpropagation learning algorithm has been proposed in [17]. The approach has achieved on the 93.29% UNSW-NB15 dataset.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, feature selection has been one of the concerns. Several studies in anomaly detection with the IDS machine learning approach have been carried out, including [4]. In that research, a flow-based IDS uses two machine learning methods: J48 Decision Tree and Multi-layer perceptron (MLP).…”
Section: Related Workmentioning
confidence: 99%
“…The implementation of this machine learning method can be done using a data mining approach to recognize the patterns of attacks. Some research on data mining for IDS have been carried out, including research conducted by [4]. It is a flow-based IDS using two machine learning methods: J48 Decision Tree and Multi-layer Perceptron (MLP).…”
Section: Introductionmentioning
confidence: 99%