A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer
Q Zhou, Z Wang - International Journal on Semantic Web and …, 2024 - igi-global.com
A network intrusion detection method for information systems using federated learning and
improved transformer is proposed to address the problems of long detection time and low …
improved transformer is proposed to address the problems of long detection time and low …
A supervised machine learning-based solution for efficient network intrusion detection using ensemble learning based on hyperparameter optimization
An efficient machine learning (ML) ensemble technique for categorizing Intrusion Detection
(ID) is proposed in this study. The tuning of the ML model's parameters is a critical topic …
(ID) is proposed in this study. The tuning of the ML model's parameters is a critical topic …
Ensemble classifiers for network intrusion detection using a novel network attack dataset
Due to the extensive use of computer networks, new risks have arisen, and improving the
speed and accuracy of security mechanisms has become a critical need. Although new …
speed and accuracy of security mechanisms has become a critical need. Although new …
[PDF][PDF] An ensemble of classification techniques for intrusion detection systems
A Alaba, S Maitanmi, O Ajayi - International Journal of Computer …, 2019 - academia.edu
Extenuating intrusions into a network has become a great concern for network security
scholars as they pose a threat to the confidentiality, integrity and availability of the data …
scholars as they pose a threat to the confidentiality, integrity and availability of the data …
A LSTM-FCNN based multi-class intrusion detection using scalable framework
Abstract Machine learning methods are widely used to implement intrusion detection models
for detecting and classifying intrusions in a network or a system. However, many challenges …
for detecting and classifying intrusions in a network or a system. However, many challenges …
Research on Intrusion Detection Technology Based on Ensemble Learning
Y Zhao, G Gan - International Conference on Frontiers of Electronics …, 2021 - dl.acm.org
With the rapid development of Internet technology, the network scale and data have become
increasingly complex, and various forms of Internet attacks and destruction have appeared …
increasingly complex, and various forms of Internet attacks and destruction have appeared …
[PDF][PDF] Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms
ME Haque, TM Alkharobi - International Journal of Machine Learning and …, 2015 - ijml.org
In this paper, we propose a novel method using ensemble learning scheme for classifying
network intrusion detection from the most renowned KDD cup dataset. We have shown that …
network intrusion detection from the most renowned KDD cup dataset. We have shown that …
Semi-supervised machine learning framework for network intrusion detection
Network intrusion detection plays an important role as tools for managing and identifying
potential threats, which presents various challenges. Redundant features and difficult …
potential threats, which presents various challenges. Redundant features and difficult …
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM
J Liu, Y Gao, F Hu - Computers & Security, 2021 - Elsevier
Network intrusion detection systems play an important role in protecting the network from
attacks. However, Existing network intrusion data is imbalanced, which makes it difficult to …
attacks. However, Existing network intrusion data is imbalanced, which makes it difficult to …
Intrusion Detection Classification Method based on Generative Adversarial Networks
Y Lu - 2023 3rd International Conference on Frontiers of …, 2023 - ieeexplore.ieee.org
Intrusion detection technology is crucial for network security defense as it enables the
detection of network attacks. To address the problem of small sample size in intrusion …
detection of network attacks. To address the problem of small sample size in intrusion …