A Step Forward to Revolutionize Intrusion Detection System Using Deep Convolutional Neural Network

作者: Ratul Chowdhury , Banani Saha , Samir Kumar Bandyopadhyay , Arindam Roy

DOI: 10.1007/978-981-15-9873-9_27

关键词:

摘要:

参考文章(21)
Jerome Darmont, Dewan Md. Farid, Mohammad Zahidur Rahman, Nguyen Huu Hoa, Nouria Harbi, Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering. ,vol. 3, pp. 2762- 2766 ,(2009)
Richard P Lippmann, Robert K Cunningham, Improving intrusion detection performance using keyword selection and neural networks recent advances in intrusion detection. ,vol. 34, pp. 597- 603 ,(2000) , 10.1016/S1389-1286(00)00140-7
Adriana-Cristina Enache, Victor Valeriu Patriciu, Intrusions detection based on Support Vector Machine optimized with swarm intelligence symposium on applied computational intelligence and informatics. pp. 153- 158 ,(2014) , 10.1109/SACI.2014.6840052
Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, Kuobin Dai, An efficient intrusion detection system based on support vector machines and gradually feature removal method Expert Systems With Applications. ,vol. 39, pp. 424- 430 ,(2012) , 10.1016/J.ESWA.2011.07.032
Bhupendra Ingre, Anamika Yadav, Performance analysis of NSL-KDD dataset using ANN international conference on signal processing. pp. 92- 96 ,(2015) , 10.1109/SPACES.2015.7058223
Zdravko Markov, Ingrid Russell, An introduction to the WEKA data mining system ACM SIGCSE Bulletin. ,vol. 38, pp. 367- 368 ,(2006) , 10.1145/1140123.1140127
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
Swati Paliwal, Ravindra Gupta, Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm International Journal of Computer Applications. ,vol. 60, pp. 57- 62 ,(2012)
Nabila Farnaaz, M.A. Jabbar, Random Forest Modeling for Network Intrusion Detection System Procedia Computer Science. ,vol. 89, pp. 213- 217 ,(2016) , 10.1016/J.PROCS.2016.06.047