2019
DOI: 10.1016/j.asoc.2019.105612
|View full text |Cite
|
Sign up to set email alerts
|

Network anomaly detection using channel boosted and residual learning based deep convolutional neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(42 citation statements)
references
References 18 publications
0
37
0
Order By: Relevance
“…e authors also used an important number of hidden nodes (80) considering the modest performance of the model. Finally, the highest evaluation metrics were found in [13] and in this research. e main difference is simplicity: in our approach the results are obtained using weak feedforward neural learners with a small number of parameters, while their approach is based on conventional neural network that involves channel boosting, autoencoders, and stacked autoencoders and many intermediate functions.…”
mentioning
confidence: 49%
See 2 more Smart Citations
“…e authors also used an important number of hidden nodes (80) considering the modest performance of the model. Finally, the highest evaluation metrics were found in [13] and in this research. e main difference is simplicity: in our approach the results are obtained using weak feedforward neural learners with a small number of parameters, while their approach is based on conventional neural network that involves channel boosting, autoencoders, and stacked autoencoders and many intermediate functions.…”
mentioning
confidence: 49%
“…e model achieved 81.29% accuracy using 80 hidden nodes in binary classification. An effective network intrusion detection system, using an architecture called Channel Boosted and Residual learning based deep Convolutional Neural Network (CBR-CNN), is developed using one-class classification in [13]. e model uses a Reconstructed Feature Space that reconstructs a feature space using only normal traffic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Otoum et al [13] devised DL for an IDS available on wireless sensor networks (WSNs), and also compared the Boltzmann machine-based clustered IDS (RBC-IDS) and adaptive machine learning-based IDS: the adaptively supervised and clustered hybrid IDS (ASCH-IDS). Chouhan et al [14] proposed a Channel Boosted and Residual learning-based deep Convolutional Neural Network (CBR-CNN) architecture for the detection of network intrusions. This study used Stacked Auto-encoders (SAE) and unsupervised training, and the performance of the proposed CBR-CNN technique is evaluated with an NSL-KDD dataset.…”
Section: A Related Workmentioning
confidence: 99%
“…Gong et al [28] proposed model uncertainty to evaluate predictions made by DeepLearning-based Web attack models. There are also many algorithm models that use deep learning to detect Web attacks: Long Short-Term (LSTM) [29,30], Specially Designed Convolution Neural Network (SDCNN) [31], Character-Level Convolution Neural Networks (CLCNN) [32], Channel Boosted and Residual learning-based CNN (CBR-CNN) structure [33]. It can be continuously optimized during training and testing to extract more accurate feature values, but training complex network nodes or layers is slow.…”
Section: B Detection Algorithmsmentioning
confidence: 99%