In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in identifying abnormal traffic for minority classes. In order to improve the detection rate on class imbalanced dataset, we propose a network intrusion detection model based on two-layer CNN and Cluster-SMOTE + K-means algorithm (CSK-CNN) to process imbalanced dataset. CSK combines the cluster based Synthetic Minority Over Sampling Technique (Cluster-SMOTE) and K-means based under sampling algorithm. Through the two-layer network, abnormal traffic can not only be identified, but also be classi...
With massive data being generated daily and the ever-increasing interconnectivity of the world’s Int...
Since the widespread adoption of cloud technologies, there has been an increase in the demand for Ne...
Due to the increased reliance of many a human system on cyber infrastructures, there is the continuo...
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in ident...
Network intrusion detection system can effectively detect network attack behaviour, which is very im...
A network intrusion detection model that fuses a convolutional neural network and a gated recurrent ...
The network intrusion detection system is a core technology of network security that detects packets...
Due to the increasing use of networks at present, Internet systems have raised many security problem...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
The world’s reliance the use of the internet is growing constantly, and data are considered the most...
As a security defense technique to protect networks from attacks, a network intrusion detection mode...
Internet of Things (IoT) devices and services provide convenience but face serious security threats....
With the rising use of Internet technologies around the world, the number of network intruders and a...
The significant development of Internet applications over the past 10 years has resulted in the risi...
In order to adapt to the rapid development of network technology and network security detection in d...
With massive data being generated daily and the ever-increasing interconnectivity of the world’s Int...
Since the widespread adoption of cloud technologies, there has been an increase in the demand for Ne...
Due to the increased reliance of many a human system on cyber infrastructures, there is the continuo...
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in ident...
Network intrusion detection system can effectively detect network attack behaviour, which is very im...
A network intrusion detection model that fuses a convolutional neural network and a gated recurrent ...
The network intrusion detection system is a core technology of network security that detects packets...
Due to the increasing use of networks at present, Internet systems have raised many security problem...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
The world’s reliance the use of the internet is growing constantly, and data are considered the most...
As a security defense technique to protect networks from attacks, a network intrusion detection mode...
Internet of Things (IoT) devices and services provide convenience but face serious security threats....
With the rising use of Internet technologies around the world, the number of network intruders and a...
The significant development of Internet applications over the past 10 years has resulted in the risi...
In order to adapt to the rapid development of network technology and network security detection in d...
With massive data being generated daily and the ever-increasing interconnectivity of the world’s Int...
Since the widespread adoption of cloud technologies, there has been an increase in the demand for Ne...
Due to the increased reliance of many a human system on cyber infrastructures, there is the continuo...