2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2017
DOI: 10.1109/waina.2017.63
|View full text |Cite
|
Sign up to set email alerts
|

Application of Deep Recurrent Neural Networks for Prediction of User Behavior in Tor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…This scenario can only occur when robustness label(x i ) < robustness label(x j ). However; since, the training set is sufficiently large, and LSTM tends to provide substantial prediction accuracy, when trained by sufficiently large training set [21], the chances of the event-[robustness label(x i ) < robustness label(x j )]-occurring is limited, which immediately proves the theorem.…”
Section: Problem Descriptionmentioning
confidence: 84%
See 1 more Smart Citation
“…This scenario can only occur when robustness label(x i ) < robustness label(x j ). However; since, the training set is sufficiently large, and LSTM tends to provide substantial prediction accuracy, when trained by sufficiently large training set [21], the chances of the event-[robustness label(x i ) < robustness label(x j )]-occurring is limited, which immediately proves the theorem.…”
Section: Problem Descriptionmentioning
confidence: 84%
“…A. LSTM Overview LSTM [21]- [24] is a special version of Recurrent Neural Network (RNN). Sequential data, in many cases, contains correlations in different sections of the data.…”
Section: Vh Technique For Reliable and Robust Handoffmentioning
confidence: 99%
“…For future developments we consider relevant testing of other behaviors, such trying to decoy the attackers to reveal their origins. IoT honeypots are used at large scale and there is a genuine interest in developing ways to pattern attackers' behavior [50][51][52]. The results are promising but still there is room for improvement, for example considering novel encryption schemes [53,54].…”
Section: Discussionmentioning
confidence: 99%
“…Hidden Markov Models [12]. Here we apply recurrent neural networks, that were 1 http://www.disiem-project.eu/ also employed in cybersecurity tasks [13]. Recurrent Neural Networks (RNNs) [14] are a class of artificial neural network where neurons are stacked in a recursive manner.…”
Section: Related Workmentioning
confidence: 99%