Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural Network
Abstract
References
Index Terms
- Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural Network
Recommendations
Network Intrusion Detection Based on Neural Networks and D-S Evidence
Image and Video Technology – PSIVT 2015 WorkshopsAbstractNetwork traffic data is an important source of data to establish a network intrusion detection system (NIDS). The explosive growth of the network traffic data brings a huge challenge to network intrusion detection, and video traffic packet has ...
Improved convolution neural network integrating attention based deep sparse auto encoder for network intrusion detection: Improved convolution neural network integrating attention based deep sparse auto encoder for network intrusion detection
AbstractNetwork intrusion detection (NID) is seen as a pivotal technology in the network security which can detect malicious threats occurring in the network and lend stabilized services for expanding the network environments. However, Network-based ...
Enhancing byte-level network intrusion detection signatures with context
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityMany network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false-positive rate. We develop the concept of contextual signatures as an ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- National Natural Fund
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 32Total Downloads
- Downloads (Last 12 months)32
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format