2019 IEEE 44th Conference on Local Computer Networks (LCN) 2019
DOI: 10.1109/lcn44214.2019.8990890
|View full text |Cite
|
Sign up to set email alerts
|

A Neural Attention Model for Real-Time Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…claimed by Tan et al in [18] that dropping part of the attacks from the dataset would improve the detection accuracy, and we are testing this claim throughout our work. The rest of this paper will include a literature review of the previous related work, a description of the framework applied, including the dataset, the feature engineering approaches followed, including Pearson Correlation, Information Gain, Chi2, Random Forest Feature Importance RFFI, and a comparison between different machine learning classifiers including Random Forest, Decision Tree, and Gaussian Naïve Bayes.…”
Section: Introductionmentioning
confidence: 79%
“…claimed by Tan et al in [18] that dropping part of the attacks from the dataset would improve the detection accuracy, and we are testing this claim throughout our work. The rest of this paper will include a literature review of the previous related work, a description of the framework applied, including the dataset, the feature engineering approaches followed, including Pearson Correlation, Information Gain, Chi2, Random Forest Feature Importance RFFI, and a comparison between different machine learning classifiers including Random Forest, Decision Tree, and Gaussian Naïve Bayes.…”
Section: Introductionmentioning
confidence: 79%
“…Finally, we would like to suggest some of the possible scopes, shortly for researcher and practitioner as a brainstorming concept: reducing the reaction time and maximizing VM's resource allocation considering the QoS factor; improving the load stability in WSN using RCNN learning; SVM-PSO based community Forensics and RNN techniques for Intrusion Detection. Feature selection from natural algorithm Koroniotis et al [133] Quality of service NF PSO and DL Enhance NF Al hawaitat et al [134] WS PNS PSO Jamming attack Shi et al [135] Anomaly detection P ADAID 1 Presented unsupervised clustering Usman et al [96] VM allocation VR EFPA 2 Energy-oriented allocation Singh et al [103] VM migration VR HBGA 3 Energy reduction Naik et al [130] VM allocation VR Fruit fly Reduce host migration Meng & Pan [136] Optimization VR FFOA solve MKP 4 Mosa & Paton [126] VM placement VR GA Reduce response time & maximize resources utilization Duan et al [137] Information leakage P DL Protect server Festag & Spreckelsen [138] Data leakage P DL Detection of protected health information Chari et al [125] Quality of service IA DL Generate password via cognitive information Li et al [139] Signal processing IA GA Feature extraction via EEG signal Saini & Kansal [127] WSN ACS SI Reduce energy consumption and increase network life time Chen et al [140] Biometric identification IA CNN Proposed GSLT-CNN using human brain EEG Cao & Fang [141] Multilayer defense scenario ACS SI Found proficient IPSO elucidating extensive WTA problem Aliyu et al [124] Resource allocation ACS Ant colony Illustrated faster convergence optimize makespan time Poonia [142] VAN ACS SI Found significant difference in VANET routing protocol and Swarm based protocol Verma et al [ [129] Feature extraction ID GA Reduce features to classify network packet Tan et al [148] Real time network attack intrusion ID NN Able to detect in network precisely…”
Section: Discussionmentioning
confidence: 99%
“…Intuitively, solutions based on white-box models should be preferable, as they are also simpler. We note that explainable models [28] based on the paradigm of attention [30] are being explored in the context of intrusion detection (e.g., [31]) and could boost IoT as well. We finally note that explainability is related also to requirements such as law compliance, accountability, fairness [28], [29].…”
Section: Holistic Evaluationmentioning
confidence: 99%