2020
DOI: 10.47839/ijc.19.3.1893
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in Computer Networks Using Latent Space Representation and Machine Learning

Abstract: Anomaly detection (AD) identifies samples that are not related to the overall distribution in the feature space. This problem has a long history of research through diverse methods, including statistical and modern Deep Neural Networks (DNN) methods. Non-trivial tasks such as covering ambiguous user actions and the complexity of standard algorithms challenged researchers. This article discusses the results of introducing an intrusion detection system using a machine learning (ML) approach. We compared these re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Ensemble feature selections [2][3][4][5] are popular due to their accuracy and stability [6,7]. Deep Learning [8][9][10][11][12][13][14] is a recent field of study in machine learning that has had remarkable success in high-level data abstraction and representation. Instead of using a single shallow "fat" structure, it employs numerous levels of non-linear operations to address the relevant machine learning problems.…”
Section: Introductionmentioning
confidence: 99%
“…Ensemble feature selections [2][3][4][5] are popular due to their accuracy and stability [6,7]. Deep Learning [8][9][10][11][12][13][14] is a recent field of study in machine learning that has had remarkable success in high-level data abstraction and representation. Instead of using a single shallow "fat" structure, it employs numerous levels of non-linear operations to address the relevant machine learning problems.…”
Section: Introductionmentioning
confidence: 99%
“…Second, machine learning based approaches (see e.g. [3]- [6]) use classifiers like neural networks or random forests. They are trained on data containing attacks and normal instances, usually on a flow basis.…”
Section: Introductionmentioning
confidence: 99%