2020
DOI: 10.3390/sym12091458
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Intrusion Detection Method Based on LightGBM and Autoencoder

Abstract: Due to the insidious characteristics of network intrusion behaviors, developing an efficient intrusion detection system is still a big challenge, especially in the era of big data where the number of traffic and the dimension of each traffic feature are high. Because of the shortcomings of traditional common machine learning algorithms in network intrusion detection, such as insufficient accuracy, a network intrusion detection system based on LightGBM and autoencoder (AE) is proposed. The LightGBM-AE model pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(18 citation statements)
references
References 27 publications
(24 reference statements)
0
16
0
2
Order By: Relevance
“…Auto Encoder [122], [124], [136], [137] Advantages: Specialized neural network with a "bottleneck" architecture. Suitable for finding an encoding of the input data.…”
Section: Discussionmentioning
confidence: 99%
“…Auto Encoder [122], [124], [136], [137] Advantages: Specialized neural network with a "bottleneck" architecture. Suitable for finding an encoding of the input data.…”
Section: Discussionmentioning
confidence: 99%
“…The UNSW-NB15 dataset was used to validate the proposed intrusion detection model. Tang et al [21] proposed an intrusion detection system based on LightGBM and AE. The proposed LightGBM-AE model consists of three steps: data preprocessing, feature selection and classification.…”
Section: Related Workmentioning
confidence: 99%
“…Cil et al [3], the preprocessing consists of three steps: preparing data like dropping rows and columns with misleading values, normalization where dataset is scaled as either '0' or '1' based on the type of attack and finally splitting the dataset into training and testing sets. Chaofei Tang et al [27] uses one-hot-encoding technology to convert 3 types of non-numeric categorical features: protocol type (tcp, udp,icmp), flag and service into binary vectors.…”
Section: Preprocessingmentioning
confidence: 99%