Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

    Nazarii Lutsiv1, Taras Maksymyuk1,*, Mykola Beshley1, Orest Lavriv1, Volodymyr Andrushchak1, Anatoliy Sachenko2, Liberios Vokorokos3, Juraj Gazda3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 413-431, 2022, DOI:10.32604/cmc.2022.018773 - 07 September 2021

    Abstract The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels. With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks. In this paper, we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous… More >

  • Open Access

    ARTICLE

    Multi-Layer Reconstruction Errors Autoencoding and Density Estimate for Network Anomaly Detection

    Ruikun Li1,*, Yun Li2, Wen He1,3, Lirong Chen1, Jianchao Luo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 381-398, 2021, DOI:10.32604/cmes.2021.016264 - 28 June 2021

    Abstract Anomaly detection is an important method for intrusion detection. In recent years, unsupervised methods have been widely researched because they do not require labeling. For example, a nonlinear autoencoder can use reconstruction errors to attain the discrimination threshold. This method is not effective when the model complexity is high or the data contains noise. The method for detecting the density of compressed features in a hidden layer can be used to reduce the influence of noise on the selection of the threshold because the density of abnormal data in hidden layers is smaller than normal… More >

  • Open Access

    ARTICLE

    A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection

    Lewis Nkenyereye1, Bayu Adhi Tama2, Sunghoon Lim3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2217-2227, 2021, DOI:10.32604/cmc.2020.012432 - 26 November 2020

    Abstract An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing infrastructure since new types of attacks can be discovered. It prevalently utilizes several machine learning algorithms (ML) for detecting and classifying network traffic. To date, lots of algorithms have been proposed to improve the detection performance of A-IDS, either using individual or ensemble learners. In particular, ensemble learners have shown remarkable performance over individual learners in many applications, including in cybersecurity domain. However, most existing works still suffer from unsatisfactory results due to improper ensemble design. The aim of this study More >

  • Open Access

    ARTICLE

    Oversampling Methods Combined Clustering and Data Cleaning for Imbalanced Network Data

    Yang Yang1,*, Qian Zhao1, Linna Ruan2, Zhipeng Gao1, Yonghua Huo3, Xuesong Qiu1

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1139-1155, 2020, DOI:10.32604/iasc.2020.011705

    Abstract In network anomaly detection, network traffic data are often imbalanced, that is, certain classes of network traffic data have a large sample data volume while other classes have few, resulting in reduced overall network traffic anomaly detection on a minority class of samples. For imbalanced data, researchers have proposed the use of oversampling techniques to balance data sets; in particular, an oversampling method called the SMOTE provides a simple and effective solution for balancing data sets. However, current oversampling methods suffer from the generation of noisy samples and poor information quality. Hence, this study proposes More >

Displaying 1-10 on page 1 of 4. Per Page