2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) 2022
DOI: 10.1109/icsp54964.2022.9778404
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection model based on neural network feature extraction and PSO-SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The results of a comparative analysis of the proposed MLDN model with the HBM model, the APID model, and models proposed by [5,6], [7], [8], and [9] are shown in Fig. 20 to 22.…”
Section: Resultsmentioning
confidence: 99%
“…The results of a comparative analysis of the proposed MLDN model with the HBM model, the APID model, and models proposed by [5,6], [7], [8], and [9] are shown in Fig. 20 to 22.…”
Section: Resultsmentioning
confidence: 99%
“…Additionally, it demonstrates enhanced learning speed when processing a large volume of data. Similar research using the feature selection technique was conducted by Chen et al [23]. The research applied CNN to extract the essential features of the dataset, and PSO was used to optimize the SVM parameters as the classifiers.…”
Section: Related Workmentioning
confidence: 97%
“…Several approaches implement the common machine learning methods, such as random forest, support vector machine, and decision tree [20,21]. Besides, the other research focuses on reducing the dimensionality of features in the dataset using several feature selection techniques such as particle swarm optimization, Chi-Square, and grasshopper optimization [1,[22][23][24]. Another research implemented a hybrid algorithm to improve the accuracy and efficiency of IDS [25].…”
Section: Related Workmentioning
confidence: 99%
“…Traffic is divided into sessions and monitored, and its nature (intrusion or normal traffic) is determined. Therefore, to convert traffic into features, it is divided into a specific session, and then features for the session are created using traffic belonging to the session [7][8][9][10][11][12][13]. A session is a concept that exists in the Transmission Control Protocol (TCP), but the User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) also extend the concept of TCP to define sessions.…”
Section: Existing Work 21 Session-based Nidsmentioning
confidence: 99%