2021
DOI: 10.1007/s10776-021-00520-z
|View full text |Cite
|
Sign up to set email alerts
|

Research on Network Intrusion Detection Technology Based on Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…The GAN-Cross model uses DNN as a hidden layer to capture highly nonlinear relationships between data. Take the randomly generated hidden space noise z and the corresponding class label y as the input of the generator, passing through the cross-layers The cross-operation is shown in formula (1).…”
Section: R E T R a C T E D A R T I C L Ementioning
confidence: 99%
See 1 more Smart Citation
“…The GAN-Cross model uses DNN as a hidden layer to capture highly nonlinear relationships between data. Take the randomly generated hidden space noise z and the corresponding class label y as the input of the generator, passing through the cross-layers The cross-operation is shown in formula (1).…”
Section: R E T R a C T E D A R T I C L Ementioning
confidence: 99%
“…Currently, network security attacks occur frequently. At a time when cyber security attacks pose a serious threat and their destructive attack power is becoming increasingly serious, how to gain early and timely insight into and grasp the development trend of cyber security, understand the harmful techniques of various new cyber security attacks, and make targeted and effective proactive responses to them has gradually become a common research focus in different fields [1,2]. Network intrusion detection system (NIDS) can actively detect attacks through network traffic analysis, and it plays a crucial role in network security [3].…”
Section: Introductionmentioning
confidence: 99%
“…Drawing on the advantages of deep learning, traditional machine learning algorithms are combined with feature selection and are widely applied in the field of network intrusion detection, such as random forest, support vector machine, K-nearest neighbor, decision tree, etc. [19,20], all of which have achieved good results. Commonly used datasets related to intrusion detection include KDD Cup 99, DARPA 1998, ADFA-LD, CIC-IDS2017, UNSW-NB15, etc.…”
Section: Literature Reviewmentioning
confidence: 95%
“…The effectiveness of the random forest is better in terms of precision, accuracy, and F-measure. F. Wu et al [42] Analyzed the four classes of attack detection using the dataset KDDCUP99 by the application improved random forest-support vector machine learning model. The average accuracy of this model is 97.04%, which is less than compared to the new techniques.…”
Section: Ac = (5)mentioning
confidence: 99%