SoutheastCon 2018 2018
DOI: 10.1109/secon.2018.8478898
|View full text |Cite
|
Sign up to set email alerts
|

Applying Long Short-Term Memory Recurrent Neural Network for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
4

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 6 publications
0
20
0
4
Order By: Relevance
“…To further validate the effectiveness of our generated adversarial dataset, we applied the original dataset and the adversarial dataset to LSTM [18] and XGBoost [19]. The hyperparameters of the comparison classifiers are shown in Table 3.…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…To further validate the effectiveness of our generated adversarial dataset, we applied the original dataset and the adversarial dataset to LSTM [18] and XGBoost [19]. The hyperparameters of the comparison classifiers are shown in Table 3.…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…Through the performance tests, they have confirmed that the method of deep learning is sufficient for the IDS [34]. Yin Chuan-long et al [35], [36] presented the design and implementation of the detection system based on recurrent NNs. In addition to that, they have investigated the model efficiency in binary and multi-class classifications, the number of neurons and various learning rate effects on the precision.…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 91%
“…The number of the iterations has been predefined as 100 epochs, the initialized weights of the network were in the range of (0 -0.05) and the loss function was logarithmic loss [36]. They have discovered that the Adam optimizer is suitable for the LSTM RNN model in the detection of intrusions, and they have concluded the fact that LSTM RNN model utilizing Adam optimizer is capable of constructing a sufficient IDS binary classifier.…”
Section: Repeating Unitmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the early 2010s, various deep ML models have been employed for malware detection, in parallel to classical, "shallow" ML-based algorithms. Malware detection has employed various architectures of deep neural networks (DNNs): multilayer perceptrons (MLPs) [152], recurrent (RNNs) or convolutional neural networks (CNNs) [94], [153], convolutional recurrent neural networks (CRNNs) [154], autoencoders [155] and long short-term memory (LSTM) models [154], [156].…”
Section: Introducing Deep Learningmentioning
confidence: 99%