2019
DOI: 10.1007/s12652-019-01611-9
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(36 citation statements)
references
References 18 publications
0
36
0
Order By: Relevance
“…Langin et al [84], Le et al [86] , Malondkar et al [85] Auto Encoder (AE) feature learning model, insider threat detection, malware detection, intrusion detection system Yousefi et al [92], Liu et al [93], Wang et al [94], Yan et al [95] Restricted Boltzmann Machine (RBM) network anomaly detection, DoS attack detection, intrusion detection Fiore et al [99], Imamverdiyev et al [100], Mayuranathan et al [125], Alom et al [126] Deep Belief Networks (DBN) intrusion detection system and optimization, phishing detection, malware detection Salama et al [104], Qu et al [105], Wei et al [103], Yi et al [127], Arshey et al [128], Saif et al [129], Hou et al [130] Generative Adversarial Network (GAN) zero-day malware detection, botnet detection, intrusion detection systems Kim et al [108], Li et al [110], Yin et al [109], Merino et al [111] Deep Transfer Learning (DTL or Deep TL) intrusion detection system, detecting unknown network attacks, malware detection, malicious software classification Wu et al [114], Zhao et al [117], Gao et al [118], Rezende et al [119] Deep Reinforcement Learning (DRL or deep RL) intrusion detection system, malware detection, Security and Privacy Lopez et al [131], Sethi et al [132], Fang et al [133], Shakeel et al [134] the quality of the security data and the performance of the learning algorithms.…”
Section: Cybersecurity Tasksmentioning
confidence: 99%
“…Langin et al [84], Le et al [86] , Malondkar et al [85] Auto Encoder (AE) feature learning model, insider threat detection, malware detection, intrusion detection system Yousefi et al [92], Liu et al [93], Wang et al [94], Yan et al [95] Restricted Boltzmann Machine (RBM) network anomaly detection, DoS attack detection, intrusion detection Fiore et al [99], Imamverdiyev et al [100], Mayuranathan et al [125], Alom et al [126] Deep Belief Networks (DBN) intrusion detection system and optimization, phishing detection, malware detection Salama et al [104], Qu et al [105], Wei et al [103], Yi et al [127], Arshey et al [128], Saif et al [129], Hou et al [130] Generative Adversarial Network (GAN) zero-day malware detection, botnet detection, intrusion detection systems Kim et al [108], Li et al [110], Yin et al [109], Merino et al [111] Deep Transfer Learning (DTL or Deep TL) intrusion detection system, detecting unknown network attacks, malware detection, malicious software classification Wu et al [114], Zhao et al [117], Gao et al [118], Rezende et al [119] Deep Reinforcement Learning (DRL or deep RL) intrusion detection system, malware detection, Security and Privacy Lopez et al [131], Sethi et al [132], Fang et al [133], Shakeel et al [134] the quality of the security data and the performance of the learning algorithms.…”
Section: Cybersecurity Tasksmentioning
confidence: 99%
“…Working hierarchically, features extracted from a dataset are then passed on to the next layer as latent variables. RBMs were used in various research work [192,193] for network/IoT intrusion detection systems. The challenge of implementing RBMs is that it needs high computational resources while implementing it on low-powered IoT devices.…”
Section: Restricted Boltzmann Machine (Rbm)mentioning
confidence: 99%
“…The evaluation results confirmed the competitive performance of the proposed feature selection method using the improved CSA and high classification accuracy of the RNN with CSA. Mayuranathan et al [29] proposed an improved intrusion detection system with a new feature selection technique using the Random Harmony Search (RHS) optimization algorithm. The Restricted Boltzmann Machines were applied as a classifier for detection Distributed Denialof-Service (DDoS).…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, metaheuristics (MH) optimization algorithms have been adopted for various complex problems, including feature selection. They have been also applied for intrusion detection, example, genetic algorithm [23]- [25], particle swarm optimization (PSO) [26], gery wolf optimizer (GWO) [27], [28], random harmony search (RHS) [29], and crow search algorithm (CSA) [30].…”
Section: Introductionmentioning
confidence: 99%