Ren et al., 2023 - Google Patents
Mafsids: A reinforcement learning-based intrusion detection model for multi-intelligence feature selection networksRen et al., 2023
View PDF- Document ID
- 6177010724838315360
- Author
- Ren K
- Zeng Y
- Zhong Y
- Sheng B
- Zhang Y
- Publication year
External Links
Snippet
In the era of big data, the growing number of cyber assaults poses a significant danger to network services. Intrusion detection systems (IDS) rely on the quality of its features to accurately identify cyber threats. Nowadays prevalent IDS prefer to create intricate neural …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ren et al. | MAFSIDS: a reinforcement learning-based intrusion detection model for multi-agent feature selection networks | |
| Ortet Lopes et al. | Towards effective detection of recent DDoS attacks: A deep learning approach | |
| Eid et al. | Comparative study of ML models for IIoT intrusion detection: impact of data preprocessing and balancing | |
| Maseer et al. | Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges | |
| Wanda et al. | DeepOSN: Bringing deep learning as malicious detection scheme in online social network | |
| Folino et al. | An ensemble-based evolutionary framework for coping with distributed intrusion detection | |
| Moriano et al. | Adaptive anomaly detection for identifying attacks in cyber-physical systems: A systematic literature review | |
| Dixit et al. | Comparing and analyzing applications of intelligent techniques in cyberattack detection | |
| Ahuja et al. | DDoS attack traffic classification in SDN using deep learning | |
| Yassin et al. | Signature-Based Anomaly intrusion detection using Integrated data mining classifiers | |
| Ahmed et al. | [Retracted] Feature Selection Model Based on Gorilla Troops Optimizer for Intrusion Detection Systems | |
| Djenouri et al. | Interpretable intrusion detection for next generation of Internet of Things | |
| Rovetta et al. | Bot or not? a case study on bot recognition from web session logs | |
| Isma’ila et al. | Review on approaches of federated modeling in anomaly-based intrusion detection for IoT devices | |
| Sheng et al. | Network traffic anomaly detection method based on chaotic neural network | |
| Marshall et al. | A neural network approach for truth discovery in social sensing | |
| Shi et al. | A framework of intrusion detection system based on Bayesian network in IoT | |
| Subramani et al. | Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks | |
| Guo et al. | Graph-based representation learning for identifying fraud in transaction networks | |
| Rohini et al. | Intrusion detection system with an ensemble learning and feature selection framework for IoT networks | |
| Srinivasan et al. | An innovative malware detection methodology employing the amalgamation of stacked BiLSTM and CNN+ LSTM‐based classification networks with the assistance of Mayfly metaheuristic optimization algorithm in cyber‐attack | |
| Indra et al. | An ensemble learning approach for intrusion detection in IoT-based smart cities | |
| Singh et al. | Anomaly detection framework for highly scattered and dynamic data on large-scale networks using AWS | |
| Feng et al. | Network anomaly early warning through generalized network temperature and deep learning | |
| Khayat et al. | Blockchain-powered secure and scalable threat intelligence system with graph convolutional autoencoder and reinforcement learning feedback loop |