2017 International Conference on New Trends in Computing Sciences (ICTCS) 2017
DOI: 10.1109/ictcs.2017.29
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(45 citation statements)
references
References 2 publications
0
45
0
Order By: Relevance
“…Al-Zewairi et al [13] evaluated ANN on the UNSW-NB15 dataset using the back propagation and stochastic gradient descent methods, and delivering the evaluation accuracy of 98.99% with a low false alarm rate of around 0.5%.…”
Section: B Applications Of ML Algorithmsmentioning
confidence: 99%
“…Al-Zewairi et al [13] evaluated ANN on the UNSW-NB15 dataset using the back propagation and stochastic gradient descent methods, and delivering the evaluation accuracy of 98.99% with a low false alarm rate of around 0.5%.…”
Section: B Applications Of ML Algorithmsmentioning
confidence: 99%
“…The output layer activation function is softmax; a generalized logistic regression activation function is used. The number of output units in softmax is equivalent to the number of attack categories in addition to the normal class [60]. The deep learning architectures of TCNN, LSTM, and CNN are shown in Figure 6, and their hyperparameters are shown in Table 6.…”
Section: Feature Transformationmentioning
confidence: 99%
“…Therefore, many surveillance models are designed to distinguish anomalies in the working environment, such as a collision-free surveillance model in the Internet of things [10], data mining in a smart grid [11], and a UAV surveillance framework in the smart city [12]. However, the most typical and common surveillance learning algorithms in IDS models are the deep belief network [13], the artificial neural networks (ANN) [14], the support vector machine (SVM) [15], the extreme learning machine [16], the Convolutional Neural Network (CNN) [17], and so on, which have also made IDS achieve great progress in anomaly detection. The above-mentioned methods can be used alone or combined with other algorithms.…”
Section: Related Workmentioning
confidence: 99%