Comparison deep learning method to traditional methods using for network intrusion detection
Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring securit...
Saved in:
Published in | 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) pp. 581 - 585 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2016
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICCSN.2016.7586590 |
Cover
Abstract | Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection. |
---|---|
AbstractList | Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection. |
Author | Xue Wang Bo Dong |
Author_xml | – sequence: 1 surname: Bo Dong fullname: Bo Dong email: dongbo@lnu.edu.cn organization: Comput. Center, Liaoning Univ., Shenyang, China – sequence: 2 surname: Xue Wang fullname: Xue Wang email: wangxue@lnu.edu.cn organization: Inf. Technol. Center, Liaoning Univ., Shenyang, China |
BookMark | eNotj81KxDAURiPoQsd5Ad3kBVpv0iTtXUrxZ2DQxbgUhrS90WCbDGlEfHsd7eqDw-HAd8FOQwzE2JWAUgjAm03b7p5KCcKUtW6MRjhha6wboQFB1DXiOXtt43Swyc8x8IHowEeyKfjwxifK73HgOfKc7OCzj8GOC53553x0XEw8UP6K6YP7kNMv_etk6o_-JTtzdpxpveyK7e7vXtrHYvv8sGlvt4VHyEXjlNJVpaVy2hgkaUD1UqF2lpqmFySVttpC3XX9QAJAO9GRNohSgIRqxa7_q56I9ofkJ5u-98vj6gf-wVEt |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCSN.2016.7586590 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781509017799 9781509017812 150901781X 1509017798 |
EndPage | 585 |
ExternalDocumentID | 7586590 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-8f44533524f5669e2604c2495fae88c1e245a5a07bbcde1005f1be5699210203 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:51 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-8f44533524f5669e2604c2495fae88c1e245a5a07bbcde1005f1be5699210203 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7586590 |
PublicationCentury | 2000 |
PublicationDate | 2016-June |
PublicationDateYYYYMMDD | 2016-06-01 |
PublicationDate_xml | – month: 06 year: 2016 text: 2016-June |
PublicationDecade | 2010 |
PublicationTitle | 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) |
PublicationTitleAbbrev | ICCSN |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8223065 |
Snippet | Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 581 |
SubjectTerms | classifier machine learning Communication networks deep learning Feature extraction Hardware Intrusion detection Machine learning network security Software |
Title | Comparison deep learning method to traditional methods using for network intrusion detection |
URI | https://ieeexplore.ieee.org/document/7586590 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT55UWvHNHjyaNG02jz0HSxVahCr0IJR9zJYgpEXTi7_e2WxaUTx4C0vIY4dkvtn9vvkAblOVu46ANkCueUD5Ng8I1UsKiKDsO9KUU5waeTpLJy_8cZEsOnC318IgYkM-w9AdNnv5Zq23bqlsQNg2TQQV6AdZJrxWa6eDicTgoSjmM0fWSsP2xB-OKU3CGB_BdHcrzxN5C7e1CvXnry6M_32WY-h_S_PY0z7pnEAHqx68Fns3QWYQN6z1glgxbxDN6jWr36Up_cJfO_rBHOl9xQi2ssqzwVlZORFG2VynblhaVR_m4_vnYhK0tglBKaI6yC3niVNScUtQTSAVLFw7h2krMc_1EEc8kYmMMqW0wSF9hXaoMEmFcNVfFJ9Ct1pXeAbMjCyPMxNbgng8sxkhydgqI3XKc0n_iXPouXlZbnxfjGU7JRd_D1_CoYuNp1ldQZdeB68podfqponkF2IsoyI |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5jHvSksom_zcGj7bo1aZtzcWy6DWETdhBGkr6MInRjdhf_el-abqJ48FZC6Y882u-95PveR8h9pBLbEdB4wDTzEG8TD7N6iQERiL49jZhi1cjjSTR4ZU9zPm-Qh70WBgAq8hn49rDay89WemuXyjqY20ZcYIF-wLGqiJ1aa6eECURnmKbTiaVrRX596g_PlAoy-sdkvLuZY4q8-9tS-frzVx_G_z7NCWl_i_Poyx52TkkDihZ5S_d-gjQDWNPaDWJJnUU0LVe03Mgsd0t_9egHtbT3JcXElRaOD07zwsow8uo6ZcXTKtpk2n-cpQOvNk7wchGUXmIY41ZLxQwmawKwZGHaekwbCUmiu9BjXHIZxErpDLr4HZquAh4JYeu_IDwjzWJVwDmhWc-wMM5Cg0kei02MuWRoVCZ1xBKJf4oL0rLzsli7zhiLekou_x6-I4eD2Xi0GA0nz1fkyMbJka6uSRNfDW4Q3kt1W0X1CyCjpnM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+8th+IEEE+International+Conference+on+Communication+Software+and+Networks+%28ICCSN%29&rft.atitle=Comparison+deep+learning+method+to+traditional+methods+using+for+network+intrusion+detection&rft.au=Bo+Dong&rft.au=Xue+Wang&rft.date=2016-06-01&rft.pub=IEEE&rft.spage=581&rft.epage=585&rft_id=info:doi/10.1109%2FICCSN.2016.7586590&rft.externalDocID=7586590 |