2023
DOI: 10.1007/s11227-022-05025-x
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection via tri-broad learning system based on spatial-temporal granularity

Abstract: Network intrusion detection system plays a crucial role in protecting the integrity and availability of sensitive assets. Network traffic data contains a large amount of time, space, and statistical information. Existing research lacks the utilization of spatial-temporal multi-granularity data features and the mutual support among different data features, thus making it difficult to specifically and accurately identify anomalies. Taking into account the distinctions among different granularities, we propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…From this table are also derived three merit factors that contribute to the analysis of a classifier's performance: the precision (P) (6) merit factor takes into account the number of correct attack identifications concerning the total number of detections. It is obtained with the following formula: P = TP/TP + FP (6) The recall (R) (7) factor of merit takes into account the number of correct attack identifications compared to the total number of attacks made: R = TP/TP + FN (7) Finally, the F1-score factor (F1) ( 8) is given by the harmonic average of precision and recall and measures the accuracy of the classification of events:…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…From this table are also derived three merit factors that contribute to the analysis of a classifier's performance: the precision (P) (6) merit factor takes into account the number of correct attack identifications concerning the total number of detections. It is obtained with the following formula: P = TP/TP + FP (6) The recall (R) (7) factor of merit takes into account the number of correct attack identifications compared to the total number of attacks made: R = TP/TP + FN (7) Finally, the F1-score factor (F1) ( 8) is given by the harmonic average of precision and recall and measures the accuracy of the classification of events:…”
Section: Discussionmentioning
confidence: 99%
“…They might cause the loss of priceless sensitive data, such as hospital files, military records, etc. Furthermore, they can disable phone and computer Future Internet 2023, 15, 297 2 of 19 networks, making data unavailable or rendering systems unusable [5][6][7]. Banking and government networks are particularly vulnerable because of the tremendous value of the data they contain.…”
Section: Introductionmentioning
confidence: 99%