MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning
出版年份 2021 全文链接
标题
MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning
作者
关键词
Network malicious traffic detection, Features fusion, Deep learning
出版物
Computer Networks
Volume 202, Issue -, Pages 108658
出版商
Elsevier BV
发表日期
2021-12-04
DOI
10.1016/j.comnet.2021.108658
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Deep learning methods in network intrusion detection: A survey and an objective comparison
- (2020) Sunanda Gamage et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
- (2020) Mojtaba Eskandari et al. IEEE Internet of Things Journal
- An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection
- (2020) Yajing Zhang et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- Internet of Things: A survey on machine learning-based intrusion detection approaches
- (2019) Kelton A.P. da Costa et al. Computer Networks
- Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
- (2019) Arwa Aldweesh et al. KNOWLEDGE-BASED SYSTEMS
- Intrusion detection in Edge-of-Things computing
- (2019) Ahmad S. Almogren JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory
- (2019) Haipeng Yao et al. IEEE Transactions on Big Data
- Network intrusion detection system based on recursive feature addition and bigram technique
- (2018) Tarfa Hamed et al. COMPUTERS & SECURITY
- TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest
- (2018) Erxue Min et al. Security and Communication Networks
- HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection
- (2018) Wei Wang et al. IEEE Access
- An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
- (2018) Tamer Aldwairi et al. Computer Networks
- A deep learning method to detect network intrusion through flow-based features
- (2018) Abdurrahman Pektaş et al. International Journal of Network Management
- Firefly algorithm based feature selection for network intrusion detection
- (2018) Selvakumar B et al. COMPUTERS & SECURITY
- DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks
- (2017) Pradip Kumar Sharma et al. IEEE COMMUNICATIONS MAGAZINE
- A novel SVM-kNN-PSO ensemble method for intrusion detection system
- (2016) Abdulla Amin Aburomman et al. APPLIED SOFT COMPUTING
- ProTru: a provenance-based trust architecture for wireless sensor networks
- (2016) Gulustan Dogan International Journal of Network Management
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- Digital signature to help network management using flow analysis
- (2015) Mario Lemes Proença et al. International Journal of Network Management
- A hybrid method consisting of GA and SVM for intrusion detection system
- (2015) B. M. Aslahi-Shahri et al. NEURAL COMPUTING & APPLICATIONS
- Mining network data for intrusion detection through combining SVMs with ant colony networks
- (2013) Wenying Feng et al. Future Generation Computer Systems-The International Journal of eScience
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started