Song et al., 2023 - Google Patents
TGA: a novel network intrusion detection method based on TCN, BiGRU and attention mechanismSong et al., 2023
View HTML- Document ID
- 3250188214952473561
- Author
- Song Y
- Luktarhan N
- Shi Z
- Wu H
- Publication year
- Publication venue
- Electronics
External Links
Snippet
With the increasing complexity of the network environment, the types of network attacks are gradually increasing. Network intrusion detection systems can detect and identify network attacks effectively. However, the existing methods have some limitations, focusing only on …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
- G06F19/28—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology for programming tools or database systems, e.g. ontologies, heterogeneous data integration, data warehousing or computing architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fu et al. | A deep learning model for network intrusion detection with imbalanced data | |
Le et al. | Classification and explanation for intrusion detection system based on ensemble trees and SHAP method | |
Oliveira et al. | Intelligent cyber attack detection and classification for network-based intrusion detection systems | |
Alshingiti et al. | A deep learning-based phishing detection system using CNN, LSTM, and LSTM-CNN | |
Almaiah et al. | Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels | |
Zhao et al. | A heterogeneous ensemble learning framework for spam detection in social networks with imbalanced data | |
Le et al. | Network intrusion detection based on novel feature selection model and various recurrent neural networks | |
Shieh et al. | Detection of unknown ddos attacks with deep learning and gaussian mixture model | |
Chaganti et al. | A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things | |
Wang et al. | Network anomaly intrusion detection based on deep learning approach | |
Rodríguez et al. | Transfer-learning-based intrusion detection framework in IoT networks | |
Mhawi et al. | Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems | |
Xiao et al. | An intrusion detection system based on a simplified residual network | |
Tang et al. | Deep stacking network for intrusion detection | |
Alsulami et al. | An intrusion detection and classification system for IoT traffic with improved data engineering | |
Song et al. | TGA: a novel network intrusion detection method based on TCN, BiGRU and attention mechanism | |
ElKashlan et al. | A machine learning-based intrusion detection system for iot electric vehicle charging stations (evcss) | |
Imrana et al. | χ 2-bidlstm: a feature driven intrusion detection system based on χ 2 statistical model and bidirectional lstm | |
Alkahtani et al. | Developing cybersecurity systems based on machine learning and deep learning algorithms for protecting food security systems: industrial control systems | |
Wang et al. | MFDroid: A stacking ensemble learning framework for Android malware detection | |
El-Ghamry et al. | Optimized and efficient image-based IoT malware detection method | |
Joshi et al. | Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study | |
Butt et al. | Intelligent deep learning for anomaly-based intrusion detection in IoT smart home networks | |
Ethala et al. | A hybrid spider monkey and hierarchical particle swarm optimization approach for intrusion detection on Internet of Things | |
Wang et al. | Hybrid intrusion detection system based on combination of random forest and autoencoder |