An effective classifier model for imbalanced network attack data

G Çetin - 2022 - acikerisim.mu.edu.tr
Recently, machine learning algorithms have been used in the detection and classification of
network attacks. The performance of the algorithms has been evaluated by using benchmark …

Research on Radial Rotor Plunger Wear Fault Monitoring Method by Fused Sound Vibration Signal Features

Y Guo, M Guo, Y Shen, Y Peng, S Zhao - IEEE Sensors Journal, 2024 - ieeexplore.ieee.org
Aiming at the inner curve radial piston motor plunger is easy to wear by radial force. Under
the influence of fluid flow pulsations, the accuracy of fault identification for wear using a …

A Lightweight Approach for Network Intrusion Detection based on Self-Knowledge Distillation

S Yang, X Zheng, Z Xu, X Wang - ICC 2023-IEEE International …, 2023 - ieeexplore.ieee.org
Network Intrusion Detection (NID) works as a kernel technology for the security network
environment, obtaining extensive research and application. Despite enormous efforts by …

Multi-fidelity model based on synthetic minority over-sampling technique

J Song, J Liu - Multimedia Tools and Applications, 2024 - Springer
Oversampling is a commonly employed technique to address class imbalance problems by
equalizing the sizes of different data classes through the addition of the minority class data …

[PDF][PDF] An Efficient Hybrid Filter-Wrapper Feature Selection Approach for Network Intrusion Detection System.

SS Issa, SQ Salih, YD Salman, FH Taha - International Journal of …, 2023 - inass.org
The detection rate of network intrusion detection systems mainly depends on relevant
features; however, the selection of attributes or features is considered an issue in NP-hard …

Network Traffic Anomaly Detection Model Based on Feature Reduction and Bidirectional LSTM Neural Network Optimization

H Jiang, S Ji, G He, X Li - Scientific Programming, 2023 - Wiley Online Library
Aiming at the problems of large data dimension, more redundant data, and low accuracy in
network traffic anomaly detection, a network traffic anomaly detection model (FR‐APPSO …

Network intrusion classification for IoT networks using an extreme learning machine

UC Akuthota, L Bhargava - Engineering Research Express, 2024 - iopscience.iop.org
The detection of intrusions has a significant impact on providing information security, and it
is an essential technology to recognize diverse network threats effectively. This work …

基于异常行为的海洋气象传感网的入侵检测方法研究

苏新, 田天 - 通信学报, 2023 - infocomm-journal.com
应对海洋气象传感网面临的异常数据流攻击, 分析安全机制, 针对其复杂庞大的网络结构和节点
内分布极端不平衡的数据流, 对基于异常行为的海洋气象传感网入侵检测方法进行研究 …

A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security

W Yang, Z Chu, J Fan, Z Liu, KY Lam - … of the 9th ACM Cyber-Physical …, 2023 - dl.acm.org
As a special class of the Internet-of-Things (IoT), Industrial Internet-of-Things (IIoT) enhance
the efficiency of manufacturing and industrial processes by utilizing smart components and …

Socially-Aware Decentralized Learning for Intrusion Detection Systems With Imbalanced Non-IID Data

RH Hwang, CY Hsu, JJ Kuo - GLOBECOM 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
The increasing diversification of network attacks has posed many security threats. Even
within a local area network, different hosts may encounter distinct attacks. Leveraging the …