2020
DOI: 10.1016/j.compeleceng.2020.106879
|View full text |Cite
|
Sign up to set email alerts
|

Optimized neural network model for attack detection in LTE network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…The adopted DDoS attack detection and mitigation process in SDN with the DNN + SIMFO model was implemented in PYTHON and the outcomes were verified. The performance of the adopted DNN + SIMFO model with attack detection in IoT was computed over the conventional schemes such as DNN + RHSO, 52 DNN + SSOA, 53 DNN + HHO, 54 DNN + MFO, 45 DDAML, 36 CNN, 55 NN, 56 and SVM, 57 correspondingly. Furthermore, the performance of both adopted and traditional models was computed by varying the learning rate to 60, 70, and 80 based on the different performance measures, including “accuracy, sensitivity, specificity, precision, FDR, FNR, FPR, NPV, F‐Measure, Recall and MCC”, respectively.…”
Section: Resultsmentioning
confidence: 99%
“…The adopted DDoS attack detection and mitigation process in SDN with the DNN + SIMFO model was implemented in PYTHON and the outcomes were verified. The performance of the adopted DNN + SIMFO model with attack detection in IoT was computed over the conventional schemes such as DNN + RHSO, 52 DNN + SSOA, 53 DNN + HHO, 54 DNN + MFO, 45 DDAML, 36 CNN, 55 NN, 56 and SVM, 57 correspondingly. Furthermore, the performance of both adopted and traditional models was computed by varying the learning rate to 60, 70, and 80 based on the different performance measures, including “accuracy, sensitivity, specificity, precision, FDR, FNR, FPR, NPV, F‐Measure, Recall and MCC”, respectively.…”
Section: Resultsmentioning
confidence: 99%
“…While encryption is essential for maintaining data confidentiality, traditional encryption algorithms may introduce significant overhead, particularly in resource-constrained environments. To address this challenge, advanced encryption methods that prioritize lightweight and efficient cryptographic operations are recommended [13].…”
Section: Advanced Encryption Methodsmentioning
confidence: 99%
“…In case of an attack, the proposed model imposes a penalty and restricts the affected nodes from participating in MTC communication. Specifically, the improved NN was created using a new optimisation algorithm called Whale with Three-Level Update (WTU) (Jyothi and Chaudhari, 2020).…”
Section: Related Workmentioning
confidence: 99%