2018
DOI: 10.14201/adcaij2018714965
|View full text |Cite
|
Sign up to set email alerts
|

Improving Intrusion Detection Systems Using Artificial Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 3 publications
0
0
0
1
Order By: Relevance
“…A long short-term memory is primarily an advanced RNN that is less vulnerable to the diminishing curve problem, and also better capable of analyzing long-distance relationships in sequence; these features make it useful for NLP applications where sentences and documents are sequential in nature (Yaser, 2018). LSTM is only intended to memorize a portion of the sequence observed thus far as illustrated in Figure 4.…”
Section: Long Short-term Memorymentioning
confidence: 99%
“…A long short-term memory is primarily an advanced RNN that is less vulnerable to the diminishing curve problem, and also better capable of analyzing long-distance relationships in sequence; these features make it useful for NLP applications where sentences and documents are sequential in nature (Yaser, 2018). LSTM is only intended to memorize a portion of the sequence observed thus far as illustrated in Figure 4.…”
Section: Long Short-term Memorymentioning
confidence: 99%
“…Penyerang yang mengganggu sistem dengan masuk sebagai pengguna jaringan yang sah untuk mendapatkan hak istimewa tambahan dari pengguna biasa yang tidak sah dan pengguna sah yang menyalahgunakan hak yang diberikan kepada mereka. Namun IDS mendeteksi serangan atau perilaku abnormal yang terjadi di dalam jaringan dan segera mengeluarkan alarm yang mengetahui orang yang bertanggung jawab atas keamanan di jaringan saat serangan terjadi dan memintanya untuk mengambil tindakan yang diperlukan [5]. Penelitian mengusulkan sistem deteksi intrusi baru yang disebut TR-IDS, yang memanfaatkan fitur statistik dan fitur muatan dengan mengimplementasikan penyematan Word dan jaringan saraf konvolusi teks (Text-CNN) untuk mengekstrak informasi dari muatan secara efektif.…”
Section: Idsunclassified
“…In the last few years, many researches have investigated the application of NNs to intrusion detection [11]. One of the most recent studies has been prepared by Yaser A. Jasim [12]. In this work, the Backpropagation Neural Network is used due to its ability and speed to recognize packet patterns obtained from the network to detect intrusion of the system.…”
Section: Role Of Artificial Intelligence In Cybersecurity Improvementmentioning
confidence: 99%