Detection model for ambiguous intrusion using SMOTE and LSTM for Network Security
In today's interconnected world, networks play a crucial role. Consequently, network security has become increasingly vital. To ensure network security, various methods are employed, including digital signatures, firewalls, and intrusion detection. Among these methods, intrusion detection syste...
| Main Authors: | Khalaf, Al-Ogaidi Ali Hameed, Mohamed, Raihani, Raziff, Abdul Rafiez Abdul |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Semarak Ilmu Publishing
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/106131/ http://psasir.upm.edu.my/id/eprint/106131/1/document.pdf |
Similar Items
Smote and OVO multiclass method for multiple handheld placement gait identification on smartphone’s accelerometer
by: Abdul Raziff, Abdul Rafiez, et al.
Published: (2017)
by: Abdul Raziff, Abdul Rafiez, et al.
Published: (2017)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Improved class binarization model with data oversampling in gait recognition
by: Abdul Raziff, Abdul Rafiez
Published: (2019)
by: Abdul Raziff, Abdul Rafiez
Published: (2019)
Discovering and recognizing of imbalance human activity in healthcare monitoring using hybrid SMOTE Tomek technique and decision tree model
by: Mohamed, Raihani, et al.
Published: (2024)
by: Mohamed, Raihani, et al.
Published: (2024)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Network intrusion detection and alert system
by: To, Jin Yi
Published: (2024)
by: To, Jin Yi
Published: (2024)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Integration of CNN and LSTM networks for behavior feature recognition: an analysis
by: Aris, Teh Noranis Mohd, et al.
Published: (2024)
by: Aris, Teh Noranis Mohd, et al.
Published: (2024)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Optimising LSTM and BiLSTM models for time series forecasting through hyperparameter tuning
by: Nur Haizum, Abd Rahman, et al.
Published: (2025)
by: Nur Haizum, Abd Rahman, et al.
Published: (2025)
A novel BiGRUBiLSTM model for Multilevel Sentiment Analysis Using Deep Neural Network with BiGRU-BiLSTM
by: Islam, Md Shofiqul, et al.
Published: (2021)
by: Islam, Md Shofiqul, et al.
Published: (2021)
LSTM recurrent neural network classifier for high impedance fault detection in solar PV integrated power system
by: Veerasamy, Veerapandiyan, et al.
Published: (2021)
by: Veerasamy, Veerapandiyan, et al.
Published: (2021)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
An intrusion detection system (IDS) for internet network
by: Safiee, Mohd. Fauzan
Published: (2007)
by: Safiee, Mohd. Fauzan
Published: (2007)
An overview of neural networks use in anomaly intrusion detection systems
by: Sani, Yusuf, et al.
Published: (2009)
by: Sani, Yusuf, et al.
Published: (2009)
Hyperspectral image classification by integrating attention-based LSTM and hybrid spectral networks
by: Ahmed AL-Kubaisi, Mohammed, et al.
Published: (2022)
by: Ahmed AL-Kubaisi, Mohammed, et al.
Published: (2022)
SMOTE-PCADBSCAN: a novel approach for addressing class imbalance in water quality prediction
by: Norashikin Nasaruddin,, et al.
Published: (2025)
by: Norashikin Nasaruddin,, et al.
Published: (2025)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Real time end-to-end glass break detection system using LSTM deep recurrent neural network
by: Nyein Naing, Wai Yan, et al.
Published: (2019)
by: Nyein Naing, Wai Yan, et al.
Published: (2019)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Intrusion detection models using enhanced denoising autoencoders and lightgbm classifier with improved detection performance
by: Sheikh, Abdul Hameed
Published: (2023)
by: Sheikh, Abdul Hameed
Published: (2023)
Nonlinear Chemical Process Monitoring And Fault Detection Based On Modified Lstm Model
by: Zambri, Muhammad Ridzuan
Published: (2022)
by: Zambri, Muhammad Ridzuan
Published: (2022)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
Addressing imbalance in health datasets: A new method NR-clustering SMOTE and distance metric modification
by: Hairani, Hairani, et al.
Published: (2025)
by: Hairani, Hairani, et al.
Published: (2025)
Similar Items
-
Smote and OVO multiclass method for multiple handheld placement gait identification on smartphone’s accelerometer
by: Abdul Raziff, Abdul Rafiez, et al.
Published: (2017) -
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006) -
Improved class binarization model with data oversampling in gait recognition
by: Abdul Raziff, Abdul Rafiez
Published: (2019) -
Discovering and recognizing of imbalance human activity in healthcare monitoring using hybrid SMOTE Tomek technique and decision tree model
by: Mohamed, Raihani, et al.
Published: (2024) -
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)