2018
DOI: 10.1155/2018/4943509
|View full text |Cite
|
Sign up to set email alerts
|

TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest

Abstract: As we head towards the IoT (Internet of Things) era, protecting network infrastructures and information security has become increasingly crucial. In recent years, Anomaly-Based Network Intrusion Detection Systems (ANIDSs) have gained extensive attention for their capability of detecting novel attacks. However, most ANIDSs focus on packet header information and omit the valuable information in payloads, despite the fact that payload-based attacks have become ubiquitous. In this paper, we propose a novel intrusi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
56
0
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 126 publications
(59 citation statements)
references
References 28 publications
0
56
0
3
Order By: Relevance
“…Approaches based on flow-level statistics have also been proposed in [34]- [39], among many others. In particular, [36]- [39] use flow-level statistics to feed CNNs and other DL models, as discussed in Sec. II-C. To overcome the limitations of statistical approaches to DDoS detection, machine learning techniques have been explored.…”
Section: A Statistical Approaches To Ddos Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…Approaches based on flow-level statistics have also been proposed in [34]- [39], among many others. In particular, [36]- [39] use flow-level statistics to feed CNNs and other DL models, as discussed in Sec. II-C. To overcome the limitations of statistical approaches to DDoS detection, machine learning techniques have been explored.…”
Section: A Statistical Approaches To Ddos Detectionmentioning
confidence: 99%
“…Some CNN-based works [36]- [39], as identified in Sec. II-A, use flow-level statistics (total bytes, flow duration, total number of flags, etc.)…”
Section: Deep Learning For Ddos Detectionmentioning
confidence: 99%
See 3 more Smart Citations