Art
J-GLOBAL ID:202102266611432174   Reference number:21A0993454

CNN-Based Network Intrusion Detection against Denial-of-Service Attacks

サービス拒否攻撃に対するCNNベースネットワーク侵入検出【JST・京大機械翻訳】
Author (5):
Material:
Volume:Issue:Page: 916  Publication year: 2020 
JST Material Number: U7178A  ISSN: 2079-9292  Document type: Article
Article type: 原著論文  Country of issue: Switzerland (CHE)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
As cyberattacks become more in...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=21A0993454&from=J-GLOBAL&jstjournalNo=U7178A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Computer networks 
Reference (58):
  • KDD. KDD CUP. Available online: https://kdd.ics.uci.edu/databases/kddcup99/task.html (accessed on 17 March 2020). Özgür, A.; Erdem, H. A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. Peer. J. Preprints 2016, 4, e1954v1.
  • Paliwal, S.; Gupta, R. Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm. Int. J. Comput. Appl. 2012, 60, 57-62.
  • Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 2012, 31, 357-374.
  • Anwar, S.; Mohamad Zain, J.; Zolkipli, M.; Inayat, Z.; Khan, S.; Anthony, B., Jr.; Chang, V. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. Algorithms 2017, 10, 39.
  • Jing-Xin, W.; Zhi-Ying, W.; Kui, D. A network intrusion detection system based on the artificial neural networks. In Proceedings of the 3rd international conference on Information security, Shanghai, China, 14-16 November 2004; pp. 166-170.
more...
Terms in the title (3):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page