The recent boom in deep learning has revealed that the application of deep neural networks is a valuable way to address network intrusion detection problems. This paper presents a novel deep learning methodology that uses convolutional neural networks (CNNs) to equip a computer network with an effective means to analyse traffic on the network for signs of malicious activity. The basic idea is to represent network flows as 2D images and use this imagery representation of the flows to train a 2D CNN architecture. The novelty consists in deriving an imagery representation of the network flows through performing a combination of the nearest neighbour search and the clustering process. The advantage is that the proposed data mapping method allow...
Deep learning has been applied in the field of network intrusion detection and has yielded good resu...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many ne...
The recent boom in deep learning has revealed that the application of deep neural networks is a valu...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
As network cyber attacks continue to evolve, traditional intrusion detection systems are no longer a...
As network cyber attacks continue to evolve, traditional intrusion detection systems are no longer a...
The world’s reliance the use of the internet is growing constantly, and data are considered the most...
The dynamics of computer networks have changed rapidly over the past few years due to a tremendous i...
At present situation network communication is at high risk for external and internal attacks due to ...
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect...
Since the widespread adoption of cloud technologies, there has been an increase in the demand for Ne...
Recently, approaches based on the transformation of tabular data into images have gained a lot of sc...
This thesis deals with the application of deep learning techniques for anomaly detection in computer...
Deep learning has been applied in the field of network intrusion detection and has yielded good resu...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many ne...
The recent boom in deep learning has revealed that the application of deep neural networks is a valu...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
As network cyber attacks continue to evolve, traditional intrusion detection systems are no longer a...
As network cyber attacks continue to evolve, traditional intrusion detection systems are no longer a...
The world’s reliance the use of the internet is growing constantly, and data are considered the most...
The dynamics of computer networks have changed rapidly over the past few years due to a tremendous i...
At present situation network communication is at high risk for external and internal attacks due to ...
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect...
Since the widespread adoption of cloud technologies, there has been an increase in the demand for Ne...
Recently, approaches based on the transformation of tabular data into images have gained a lot of sc...
This thesis deals with the application of deep learning techniques for anomaly detection in computer...
Deep learning has been applied in the field of network intrusion detection and has yielded good resu...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many ne...