Imamverdiyev et al., 2018 - Google Patents
Deep learning method for denial of service attack detection based on restricted boltzmann machineImamverdiyev et al., 2018
View PDF- Document ID
- 8169183359385381667
- Author
- Imamverdiyev Y
- Abdullayeva F
- Publication year
- Publication venue
- Big data
External Links
Snippet
In this article, the application of the deep learning method based on Gaussian–Bernoulli type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks is considered. To increase the DoS attack detection accuracy, seven additional layers are …
- 238000001514 detection method 0 title abstract description 77
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Imamverdiyev et al. | Deep learning method for denial of service attack detection based on restricted boltzmann machine | |
Chou et al. | A survey on data-driven network intrusion detection | |
Moradi Vartouni et al. | Leveraging deep neural networks for anomaly‐based web application firewall | |
Haddadpajouh et al. | A multikernel and metaheuristic feature selection approach for IoT malware threat hunting in the edge layer | |
Alom et al. | Intrusion detection using deep belief networks | |
Devaraju et al. | Performance comparison for intrusion detection system using neural network with KDD dataset | |
Biswas et al. | Botnet traffic identification using neural networks | |
Carrasco et al. | Unsupervised intrusion detection through skip-gram models of network behavior | |
Ali et al. | A review of current machine learning approaches for anomaly detection in network traffic | |
Najar et al. | DDoS attack detection using MLP and Random Forest Algorithms | |
Rawat et al. | Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network | |
Almousa et al. | Phishing website detection: How effective are deep learning‐based models and hyperparameter optimization? | |
Chou et al. | Data-driven network intrusion detection: A taxonomy of challenges and methods | |
Muslihi et al. | Detecting SQL injection on web application using deep learning techniques: a systematic literature review | |
Ndife et al. | Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning. | |
Guo et al. | GLD‐Net: Deep Learning to Detect DDoS Attack via Topological and Traffic Feature Fusion | |
Alimoradi et al. | Deep neural classification of darknet traffic | |
Malliga et al. | A comprehensive review of deep learning techniques for the detection of (distributed) denial of service attacks | |
Almiani et al. | Cascaded hybrid intrusion detection model based on SOM and RBF neural networks | |
Liu et al. | Two statistical traffic features for certain APT group identification | |
Hemalatha et al. | Deep Learning Approaches for Intrusion Detection with Emerging Cybersecurity Challenges | |
Huynh et al. | On the performance of intrusion detection systems with hidden multilayer neural network using DSD training | |
Nyakundi | Using support vector machines in anomaly intrusion detection | |
Wighneswara et al. | Network behavior anomaly detection using decision tree | |
Tann et al. | Filtering ddos attacks from unlabeled network traffic data using online deep learning |