2022
DOI: 10.1007/s10586-022-03686-0
|View full text |Cite
|
Sign up to set email alerts
|

Fusion of deep learning based cyberattack detection and classification model for intelligent systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…These algorithms will continue to improve themselves through a process called reinforcement learning, thereby responding to new types of attacks and machine learning strategies. [5][6][7][57][58][59] All of the aforementioned studies are connected in some way, and they all offer partial answers to the problem of detecting and preventing DoS attacks. We find that DoS attacks in SDN may be identified and mitigated by different methods, including the inclusion of hardware requirements, packet drop rate, the blocking of malicious traffic at the port and switch levels, false alerts, detection accuracy, and computational overhead.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…These algorithms will continue to improve themselves through a process called reinforcement learning, thereby responding to new types of attacks and machine learning strategies. [5][6][7][57][58][59] All of the aforementioned studies are connected in some way, and they all offer partial answers to the problem of detecting and preventing DoS attacks. We find that DoS attacks in SDN may be identified and mitigated by different methods, including the inclusion of hardware requirements, packet drop rate, the blocking of malicious traffic at the port and switch levels, false alerts, detection accuracy, and computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Our ambition involves leveraging artificial intelligence‐powered algorithms to independently identify and categorize risks with exceptional precision and efficiency. These algorithms will continue to improve themselves through a process called reinforcement learning, thereby responding to new types of attacks and machine learning strategies 5–7,57–59 …”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Meanwhile, the convergence speed was very low. Alzubi et al 21 reviewed a fusion deep learning (FDL) technique to classify and detect cyber‐attacks and provide security in intelligence systems. The FDL approach used the MobileNetv2 model to extract malware with low computational complexity.…”
Section: Literature Surveymentioning
confidence: 99%