2020
DOI: 10.1155/2020/8830903
|View full text |Cite
|
Sign up to set email alerts
|

Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication

Abstract: With the development of communication systems, information securities remain one of the main concerns for the last few years. The smart devices are connected to communicate, process, compute, and monitor diverse real-time scenarios. Intruders are trying to attack the network and capture the organization’s important information for its own benefits. Intrusion detection is a way of identifying security violations and examining unwanted occurrences in a computer network. Building an accurate and effective identif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

4
5

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…Various applications of neural networks are available [18][19][20][21]. These applications exists from diverse perspective.…”
Section: Analysis Of Advantages Of Neural Network Prediction Methodsmentioning
confidence: 99%
“…Various applications of neural networks are available [18][19][20][21]. These applications exists from diverse perspective.…”
Section: Analysis Of Advantages Of Neural Network Prediction Methodsmentioning
confidence: 99%
“…e combination of the attributes of BRNN and LSTM models is collectively known as BLSTM. Gu et al [19] proposed the convolution neural network for intrusion identification purposes, while He et al [20] proposed the LSTM-based classification model for the development of the trusted model for pervasive computing. Figure 1 shows the conventional model for the BLSTM architecture.…”
Section: Deep Learning-based Blstm Modelmentioning
confidence: 99%
“…ese devices are communicating with each other and facilitating human life. e connection of these devices has provided openings directions for the smart applications which are one of the growing areas of research [1][2][3]. Among these opportunities, security and privacy are considered to be one of the major issues for researchers to tackle.…”
Section: Introductionmentioning
confidence: 99%