[go: up one dir, main page]

Ren et al., 2023 - Google Patents

Mafsids: A reinforcement learning-based intrusion detection model for multi-intelligence feature selection networks

Ren et al., 2023

View PDF
Document ID
6177010724838315360
Author
Ren K
Zeng Y
Zhong Y
Sheng B
Zhang Y
Publication year

External Links

Snippet

In the era of big data, the growing number of cyber assaults poses a significant danger to network services. Intrusion detection systems (IDS) rely on the quality of its features to accurately identify cyber threats. Nowadays prevalent IDS prefer to create intricate neural …
Continue reading at www.researchsquare.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/12Computer systems based on biological models using genetic models
    • G06N3/126Genetic algorithms, i.e. information processing using digital simulations of the genetic system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/18Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes

Similar Documents

Publication Publication Date Title
Ren et al. MAFSIDS: a reinforcement learning-based intrusion detection model for multi-agent feature selection networks
Ortet Lopes et al. Towards effective detection of recent DDoS attacks: A deep learning approach
Eid et al. Comparative study of ML models for IIoT intrusion detection: impact of data preprocessing and balancing
Maseer et al. Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Wanda et al. DeepOSN: Bringing deep learning as malicious detection scheme in online social network
Folino et al. An ensemble-based evolutionary framework for coping with distributed intrusion detection
Moriano et al. Adaptive anomaly detection for identifying attacks in cyber-physical systems: A systematic literature review
Dixit et al. Comparing and analyzing applications of intelligent techniques in cyberattack detection
Ahuja et al. DDoS attack traffic classification in SDN using deep learning
Yassin et al. Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
Ahmed et al. [Retracted] Feature Selection Model Based on Gorilla Troops Optimizer for Intrusion Detection Systems
Djenouri et al. Interpretable intrusion detection for next generation of Internet of Things
Rovetta et al. Bot or not? a case study on bot recognition from web session logs
Isma’ila et al. Review on approaches of federated modeling in anomaly-based intrusion detection for IoT devices
Sheng et al. Network traffic anomaly detection method based on chaotic neural network
Marshall et al. A neural network approach for truth discovery in social sensing
Shi et al. A framework of intrusion detection system based on Bayesian network in IoT
Subramani et al. Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks
Guo et al. Graph-based representation learning for identifying fraud in transaction networks
Rohini et al. Intrusion detection system with an ensemble learning and feature selection framework for IoT networks
Srinivasan et al. An innovative malware detection methodology employing the amalgamation of stacked BiLSTM and CNN+ LSTM‐based classification networks with the assistance of Mayfly metaheuristic optimization algorithm in cyber‐attack
Indra et al. An ensemble learning approach for intrusion detection in IoT-based smart cities
Singh et al. Anomaly detection framework for highly scattered and dynamic data on large-scale networks using AWS
Feng et al. Network anomaly early warning through generalized network temperature and deep learning
Khayat et al. Blockchain-powered secure and scalable threat intelligence system with graph convolutional autoencoder and reinforcement learning feedback loop