Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Hybrid Intrusion Detection Model Based on Spatiotemporal Features

    Linbei Wang1 , Zaoyu Tao1, Lina Wang2,*, Yongjun Ren3

    Journal of Quantum Computing, Vol.3, No.3, pp. 107-118, 2021, DOI:10.32604/jqc.2021.016857 - 21 December 2021

    Abstract With the accelerating process of social informatization, our personal information security and Internet sites, etc., have been facing a series of threats and challenges. Recently, well-developed neural network has seen great advancement in natural language processing and computer vision, which is also adopted in intrusion detection. In this research, a hybrid model integrating MultiScale Convolutional Neural Network and Long Short-term Memory Network (MSCNN-LSTM) is designed to conduct the intrusion detection. Multi-Scale Convolutional Neural Network (MSCNN) is used to extract the spatial characteristics of data sets. And Long Short-term Memory Network (LSTM) is responsible for processing More >

  • Open Access

    ARTICLE

    Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection

    Gun-Yoon Shin1, Dong-Wook Kim1, Sang-Soo Kim2, Myung-Mook Han3,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3289-3303, 2021, DOI:10.32604/cmc.2021.017502 - 06 May 2021

    Abstract Detection of unknown attacks like a zero-day attack is a research field that has long been studied. Recently, advances in Machine Learning (ML) and Artificial Intelligence (AI) have led to the emergence of many kinds of attack-generation tools developed using these technologies to evade detection skillfully. Anomaly detection and misuse detection are the most commonly used techniques for detecting intrusion by unknown attacks. Although anomaly detection is adequate for detecting unknown attacks, its disadvantage is the possibility of high false alarms. Misuse detection has low false alarms; its limitation is that it can detect only… More >

Displaying 1-10 on page 1 of 2. Per Page