2021
DOI: 10.1109/access.2021.3049249
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 57 publications
0
8
0
Order By: Relevance
“…The results of a comparative analysis of the proposed MLDN model with the HBM model, the APID model, and models proposed by [5,6], [7], [8], and [9] are shown in Fig. 20 to 22.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The results of a comparative analysis of the proposed MLDN model with the HBM model, the APID model, and models proposed by [5,6], [7], [8], and [9] are shown in Fig. 20 to 22.…”
Section: Resultsmentioning
confidence: 99%
“…A delegate test will be selected from within this subgroup in order to prepare the model. SVM-based intrusion detection systems are incorporated into another comparative SVM-based model for network intrusion detection models [9]. The most important AI methods have been implemented in a number of the models, and those models also demonstrate intriguing expectations.…”
Section: Literature Surveymentioning
confidence: 99%
“…Authors in [22] proposed intrusion detection system using a deep belief network (DBN) and improved genetic algorithm. A genetic algorithm provides an optimal network, and DBN is used to classify the intrusions.…”
Section: Literature Surveymentioning
confidence: 99%
“…The intrusion detection system presented in Mora‐Gimeno et al 28 utilized graphs and neural networks to detect network attacks. System call graph and deep neural network models were integrated to define the data structure and to detect intrusions 29,30 .…”
Section: Related Workmentioning
confidence: 99%
“…Though the presented approach improved the detection rate, it is not accurate since the minimum ranked features also produce some impacts in the intrusions. [25][26][27] The intrusion detection system presented in Mora-Gimeno et al 28 utilized graphs and neural networks to detect network attacks. System call graph and deep neural network models were integrated to define the data structure and to detect intrusions.…”
Section: Related Workmentioning
confidence: 99%