2021
DOI: 10.1007/s42979-021-00991-0
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Based on RNN Classifier for Feature Reduction

Abstract: Due to the increase in the use of the internet all over the world for business and education activates, cybercrime is increasing day by day in spite of the development of security protocols and algorithms. Recent research is based on the intrusion detection system. We attempt to develop is a secure protocol to detect malicious data, along with actual data, in the incoming data traffic. An intrusion detection system based on a recurrent neural network (RNN) classifier for feature reduction. Failure in intrusion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 18 publications
(26 reference statements)
0
4
0
Order By: Relevance
“…[31][32][33][34]), such as Recurrent Neural Networks (RNN) (ref. [35,36]) and Convolutional Neural Networks (CNN) (ref. [37]), have been developed to enhance traditional detection algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…[31][32][33][34]), such as Recurrent Neural Networks (RNN) (ref. [35,36]) and Convolutional Neural Networks (CNN) (ref. [37]), have been developed to enhance traditional detection algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…As in [ 31 ], where the hybrid deep learning model CNN-OLSTM is used to detect DDos attacks and the grey wolf optimization method is present to choose the best features for detection, but it obtains a very low specificity of 51%. In [ 11 ], a feature reduction model based on correlation and information gain, followed by using a RNN classifier for the detection of attacks and non-attacks in a reduced-feature dataset, where 90% of the NSLKDD dataset is used for training. In [ 32 ] suggested that using the whale algorithm to optimize the weights of LSTM networks to develop an effective model is called WILS, the abbreviation for whale integrated long short term memory to detect a variety of threats on IoT networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This makes DL models more adaptable and flexible, as they can handle a wide range of input types and sizes. In the domain of intrusion detection, the most recent papers are using DL [8,[11][12][13]. RNN is one of the most popular deep learning algorithms for the classification of sequential data due to its recurrent (circular) manner of connections.…”
Section: Introductionmentioning
confidence: 99%
“…In (Deore & Bhosale, 2021), a feature selection algorithm has been proposed using a recurrent neural network (RNN). The proposed algorithm combines correlation and information gain for feature reduction.…”
Section: -Related Workmentioning
confidence: 99%