2021
DOI: 10.1007/s11277-021-08359-6
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Traffic classification Using Long Short-Term Memory (LSTM) Model

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Some well-known classifier evaluation measures include accuracy (also known as recognition rate), sensitivity (or recall), specificity, precision, and F1 Score [7], [19], [20].…”
Section: Discussionmentioning
confidence: 99%
“…Some well-known classifier evaluation measures include accuracy (also known as recognition rate), sensitivity (or recall), specificity, precision, and F1 Score [7], [19], [20].…”
Section: Discussionmentioning
confidence: 99%
“…The architecture of speed network typically consists of the following components: The Network In Card (NIC), which is a hardware component that connects the computer to the n server. The classification of its speed as bits or bytes is discussed above in Table [64] Sensors 2023, 23, x FOR PEER REVIEW 4 of 25 are 40 Gigabit Ethernet, 100 Gigabit Ethernet, and InfiniBand [22]. A Cisco Report predicted that the internet protocol may cross 4.3 zettabytes in 2023, which is 1879 exabytes higher than 2018 [3].…”
Section: Architecture Of High-speed Networkmentioning
confidence: 99%
“…Here, "none" is the dynamic size number of instances, "48" is the number of features, and "1" is the third dimension value. The output shape of this layer is (none, 48,24) for combined DDoS and (none, 10, 20) for the car-hacking dataset, which is the input to the next layer. LSTM has a series of gates for the flow control of information, for example, how data come in, saves it, and leaves.…”
Section: Lstmmentioning
confidence: 99%
“…For IDS, some commonly used DL algorithms are convolutional neural network (CNN), recurrent neural network (RNN), LSTM, and GRU. The CCN is more complex than other DL algorithms, because it requires data-like images in matrix form; the data must be normalized and converted into the form of an image matrix [ 24 , 25 , 26 , 27 , 28 , 29 ]. The LSTM and GRU algorithms are effective at detecting malicious assaults over other ML and DL algorithms.…”
Section: Introductionmentioning
confidence: 99%