A two-stage intrusion detection system with auto-encoder and LSTMs.
Earum MushtaqAneela ZameerMuhammad UmerAsima Akber AbbasiPublished in: Appl. Soft Comput. (2022)
Keyphrases
- intrusion detection system
- intrusion detection
- anomaly detection
- network security
- rate distortion
- computer networks
- bit rate
- distributed intrusion detection
- network intrusion detection
- network traffic
- cyber security
- network intrusions
- computer systems
- intrusion prevention
- attack detection
- data sets
- data mining techniques
- network intrusion detection systems
- network attacks
- unauthorized access
- misuse detection
- alert correlation
- video coding
- network traffic data
- attack scenarios
- normal behavior
- database systems
- computer vision