Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Network anomaly detection using deep learning techniques
by
Hosahalli, Doreswamy
, Hooshmand, Mohammad Kazim
in
Accuracy
/ Algorithms
/ Anomalies
/ artificial intelligence
/ Artificial neural networks
/ cellular neural nets
/ Classification
/ Communications traffic
/ Computer vision
/ convolution
/ Cybersecurity
/ Datasets
/ Deep learning
/ feedforward neural nets
/ Machine learning
/ Network topologies
/ neural nets
/ neural network
/ Neural networks
/ Sampling methods
/ Sampling techniques
/ security
/ Software
/ TCP (protocol)
/ telecommunication traffic
/ Traffic control
/ transport protocols
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Network anomaly detection using deep learning techniques
by
Hosahalli, Doreswamy
, Hooshmand, Mohammad Kazim
in
Accuracy
/ Algorithms
/ Anomalies
/ artificial intelligence
/ Artificial neural networks
/ cellular neural nets
/ Classification
/ Communications traffic
/ Computer vision
/ convolution
/ Cybersecurity
/ Datasets
/ Deep learning
/ feedforward neural nets
/ Machine learning
/ Network topologies
/ neural nets
/ neural network
/ Neural networks
/ Sampling methods
/ Sampling techniques
/ security
/ Software
/ TCP (protocol)
/ telecommunication traffic
/ Traffic control
/ transport protocols
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Network anomaly detection using deep learning techniques
by
Hosahalli, Doreswamy
, Hooshmand, Mohammad Kazim
in
Accuracy
/ Algorithms
/ Anomalies
/ artificial intelligence
/ Artificial neural networks
/ cellular neural nets
/ Classification
/ Communications traffic
/ Computer vision
/ convolution
/ Cybersecurity
/ Datasets
/ Deep learning
/ feedforward neural nets
/ Machine learning
/ Network topologies
/ neural nets
/ neural network
/ Neural networks
/ Sampling methods
/ Sampling techniques
/ security
/ Software
/ TCP (protocol)
/ telecommunication traffic
/ Traffic control
/ transport protocols
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Network anomaly detection using deep learning techniques
2022
Request Book From Autostore
and Choose the Collection Method
Overview
Convolutional neural networks (CNNs) are the specific architecture of feed‐forward artificial neural networks. It is the de‐facto standard for various operations in machine learning and computer vision. To transform this performance towards the task of network anomaly detection in cyber‐security, this study proposes a model using one‐dimensional CNN architecture. The authors' approach divides network traffic data into transmission control protocol (TCP), user datagram protocol (UDP), and OTHER protocol categories in the first phase, then each category is treated independently. Before training the model, feature selection is performed using the Chi‐square technique, and then, over‐sampling is conducted using the synthetic minority over‐sampling technique to tackle a class imbalance problem. The authors' method yields the weighted average f‐score 0.85, 0.97, 0.86, and 0.78 for TCP, UDP, OTHER, and ALL categories, respectively. The model is tested on the UNSW‐NB15 dataset.
This website uses cookies to ensure you get the best experience on our website.