2018 24th International Conference on Pattern Recognition (ICPR) 2018
DOI: 10.1109/icpr.2018.8546162
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Deep Learning Based Scheme for Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 55 publications
(41 citation statements)
references
References 20 publications
0
30
0
Order By: Relevance
“…This model not only excelled in detection rate, precision and F1 score, but also outperformed the current existing IDS model in terms of training and detection time. However, when the researchers made use of the method in [44] to perform feature reduction on the UNSW-NB15 dataset after one-hot encoding, the number of features has changed from 208 to 202, which was only 6 fewer. If a more effective special diagnosis extraction method is used, the NIDS will be more perfect.…”
Section: B Intrusion Detection Technologymentioning
confidence: 99%
“…This model not only excelled in detection rate, precision and F1 score, but also outperformed the current existing IDS model in terms of training and detection time. However, when the researchers made use of the method in [44] to perform feature reduction on the UNSW-NB15 dataset after one-hot encoding, the number of features has changed from 208 to 202, which was only 6 fewer. If a more effective special diagnosis extraction method is used, the NIDS will be more perfect.…”
Section: B Intrusion Detection Technologymentioning
confidence: 99%
“…This subsection investigates the recently proposed auto-encoder-based misuse detection schemes such as [45][46][47][48][49][50][51][52]. For instance, in [53], Al-Qatf et al presented STL-IDS, a deep learning approach based on selftaught learning (STL) framework for feature learning and dimension reduction.…”
Section: Auto-encoder Based Schemesmentioning
confidence: 99%
“…In this way, the risk of learning the identity function instead of extracting features is eliminated. Regrettably, there are little literatures about traffic classification using DAE, while some work used DAE for IDS and Network Anormaly Detection [45], [46].…”
Section: ) Aementioning
confidence: 99%