期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Conceptualisation of Cyberattack prediction with deep learning
1
作者 Ayei E.Ibor Florence A.Oladeji +1 位作者 olusoji b.okunoye Obeten O.Ekabua 《Cybersecurity》 CSCD 2020年第1期176-189,共14页
The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users.New paradigms add more concerns with big data collected through device sensors divulging large amounts of in... The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users.New paradigms add more concerns with big data collected through device sensors divulging large amounts of information,which can be used for targeted attacks.Though a plethora of extant approaches,models and algorithms have provided the basis for cyberattack predictions,there is the need to consider new models and algorithms,which are based on data representations other than task-specific techniques.Deep learning,which is underpinned by representation learning,has found widespread relevance in computer vision,speech recognition,natural language processing,audio recognition,and drug design.However,its non-linear information processing architecture can be adapted towards learning the different data representations of network traffic to classify benign and malicious network packets.In this paper,we model cyberattack prediction as a classification problem.Furthermore,the deep learning architecture was co-opted into a new model using rectified linear units(ReLU)as the activation function in the hidden layers of a deep feed forward neural network.Our approach achieves a greedy layer-by-layer learning process that best represents the features useful for predicting cyberattacks in a dataset of benign and malign traffic.The underlying algorithm of the model also performs feature selection,dimensionality reduction,and clustering at the initial stage,to generate a set of input vectors called hyper-features.The model is evaluated using CICIDS2017 and UNSW_NB15 datasets on a Python environment test bed.Results obtained from experimentation show that our model demonstrates superior performance over similar models. 展开更多
关键词 Cyberattacks PREDICTION Deep learning PYTHON Dimensionality reduction
原文传递
Conceptualisation of Cyberattack prediction with deep learning
2
作者 Ayei E.Ibor Florence A.Oladeji +1 位作者 olusoji b.okunoye Obeten O.Ekabua 《Cybersecurity》 2018年第1期788-801,共14页
The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users.New paradigms add more concerns with big data collected through device sensors divulging large amounts of in... The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users.New paradigms add more concerns with big data collected through device sensors divulging large amounts of information,which can be used for targeted attacks.Though a plethora of extant approaches,models and algorithms have provided the basis for cyberattack predictions,there is the need to consider new models and algorithms,which are based on data representations other than task-specific techniques.Deep learning,which is underpinned by representation learning,has found widespread relevance in computer vision,speech recognition,natural language processing,audio recognition,and drug design.However,its non-linear information processing architecture can be adapted towards learning the different data representations of network traffic to classify benign and malicious network packets.In this paper,we model cyberattack prediction as a classification problem.Furthermore,the deep learning architecture was co-opted into a new model using rectified linear units(ReLU)as the activation function in the hidden layers of a deep feed forward neural network.Our approach achieves a greedy layer-by-layer learning process that best represents the features useful for predicting cyberattacks in a dataset of benign and malign traffic.The underlying algorithm of the model also performs feature selection,dimensionality reduction,and clustering at the initial stage,to generate a set of input vectors called hyper-features.The model is evaluated using CICIDS2017 and UNSW_NB15 datasets on a Python environment test bed.Results obtained from experimentation show that our model demonstrates superior performance over similar models. 展开更多
关键词 Cyberattacks PREDICTION Deep learning PYTHON Dimensionality reduction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部