A bidirectional LSTM deep learning approach for intrusion detection

Y Imrana, Y Xiang, L Ali, Z Abdul-Rauf - Expert Systems with Applications, 2021 - Elsevier
The rise in computer networks and internet attacks has become alarming for most service
providers. It has triggered the need for the development and implementation of intrusion …

Evaluation of recurrent neural network and its variants for intrusion detection system (IDS)

R Vinayakumar, KP Soman… - International Journal of …, 2017 - igi-global.com
This article describes how sequential data modeling is a relevant task in Cybersecurity.
Sequences are attributed temporal characteristics either explicitly or implicitly. Recurrent …

A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM

J Liu, Y Gao, F Hu - Computers & Security, 2021 - Elsevier
Network intrusion detection systems play an important role in protecting the network from
attacks. However, Existing network intrusion data is imbalanced, which makes it difficult to …

Applying convolutional neural network for network intrusion detection

R Vinayakumar, KP Soman… - … on Advances in …, 2017 - ieeexplore.ieee.org
Recently, Convolutional neural network (CNN) architectures in deep learning have achieved
significant results in the field of computer vision. To transform this performance toward the …

LSTM for anomaly-based network intrusion detection

SA Althubiti, EM Jones, K Roy - 2018 28th International …, 2018 - ieeexplore.ieee.org
Due to the massive amount of the network traffic, attackers have a great chance to cause a
huge damage to the network system or its users. Intrusion detection plays an important role …

A scalable and hybrid intrusion detection system based on the convolutional-LSTM network

MA Khan, MR Karim, Y Kim - Symmetry, 2019 - mdpi.com
With the rapid advancements of ubiquitous information and communication technologies, a
large number of trustworthy online systems and services have been deployed. However …

[HTML][HTML] An intrusion detection model based on a convolutional neural network

J Kim, Y Shin, E Choi - Journal of Multimedia Information System, 2019 - jmis.org
Abstract Machine-learning techniques have been actively employed to information security
in recent years. Traditional rule-based security solutions are vulnerable to advanced attacks …

Arithmetic optimization with ensemble deep learning SBLSTM-RNN-IGSA model for customer churn prediction

N Jajam, NP Challa, KSL Prasanna, VSD Ch - Ieee Access, 2023 - ieeexplore.ieee.org
Companies in a wide variety of industries use the customer churn prediction (CCP) process
to keep their current clientele happy. Insurance companies need to be able to forecast churn …

LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems

G Kim, H Yi, J Lee, Y Paek, S Yoon - arXiv preprint arXiv:1611.01726, 2016 - arxiv.org
In computer security, designing a robust intrusion detection system is one of the most
fundamental and important problems. In this paper, we propose a system-call language …

Using a long short-term memory recurrent neural network (LSTM-RNN) to classify network attacks

PS Muhuri, P Chatterjee, X Yuan, K Roy, A Esterline - Information, 2020 - mdpi.com
An intrusion detection system (IDS) identifies whether the network traffic behavior is normal
or abnormal or identifies the attack types. Recently, deep learning has emerged as a …