2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS) 2021
DOI: 10.1109/mass52906.2021.00026
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection based on BiSRU and CNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 3 publications
0
1
0
Order By: Relevance
“…The methods we used in our comparison were as follows: SVM [36], which uses support vector machines, a traditional machine learning method, to classify packets as trusted or malicious; CNN [37], which uses only convolutional neural network performs spatial feature extraction and uses the loss function and redundant error items designed by the spatial characteristics of the link load to achieve intrusion detection; LSTM [38], which only uses long short-term Memory network training to obtain the characteristics of traffic data changes in the time dimension In order to achieve intrusion detection; and CNN-BiSRU [39], which uses two deep learning models for serial feature extraction, with the first being convolutional neural network to extract the spatial features of the original data and the other being bidirectional simple recurrent unit to extract the temporal features based on it. Finally, the classification results were output through softmax to achieve the purpose of intrusion detection.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…The methods we used in our comparison were as follows: SVM [36], which uses support vector machines, a traditional machine learning method, to classify packets as trusted or malicious; CNN [37], which uses only convolutional neural network performs spatial feature extraction and uses the loss function and redundant error items designed by the spatial characteristics of the link load to achieve intrusion detection; LSTM [38], which only uses long short-term Memory network training to obtain the characteristics of traffic data changes in the time dimension In order to achieve intrusion detection; and CNN-BiSRU [39], which uses two deep learning models for serial feature extraction, with the first being convolutional neural network to extract the spatial features of the original data and the other being bidirectional simple recurrent unit to extract the temporal features based on it. Finally, the classification results were output through softmax to achieve the purpose of intrusion detection.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…For example, Jie used a prediction method based on BiSRU to achieve high accuracy prediction for intrusion detection of industrial control systems [14]. Ding used an intrusion detection model combining CNN and BiSRU to achieve accurate prediction of network intrusion [15]. Ding proposed an effective model for network security protection using BiSRU in conjunction with feature reduction for identifying anomalous traffic [16].…”
Section: Introductionmentioning
confidence: 99%