The anomaly-based detection method is a popular and challenging research area in identifying new threats. So, this study focuses on developing an efficient network anomaly-based detection approach. It can estab
Therefore, the paper proposes an improved parallel network traffic anomaly detection method based on Bagging and GRU (PB-GRU). This method uses GRU deep neural network to perform efficient hierarchical feature representation and learn the time-dependent characteristics of network traffic data to achieve...
With the rapid development of network technologies and the increasing amount of network abnormal traffic, network anomaly detection presents challenges. Existing supervised methods cannot detect unknown attack, and unsupervised methods have low anomaly d
With the widespread application of the Internet, network security issues have become increasingly prominent. As an important infrastructure of the Internet, the domain name server has been attacked in various forms. Traditional methods for detecting mali
detection accuracy. Furthermore, to simplify the model's complexity, we replace the convolutional layers in the network with depthwise separable convolutions (DSC). Through evaluation on public datasets such as CUHK Avenue, UCSD Peds1, and UCSD Peds2, our proposed network model exhibits both high...
A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data In video surveillance, anomaly detection requires training machine learning models on spatio-temporal video sequences. However, sometimes the video-only da... S Tariq,Ata-Ur- Rehman,M Abubakar,.....
In this paper we present an improved detection network with a masking system to improve the quality of OCR performed on documents. By filtering non-textual elements from the image we can utilize document-level OCR to incorporate contextual information to improve OCR results. We perform a unified ...
The importance of intrusion detection systems, which is a very important component of protecting information and reducing the damage resulting from attacks and penetrations of network systems, has increased due to the adoption of the most recent regulations on advanced web services, whether government ...
To improve the blockchain consensus algorithm practical Byzantine fault tolerance (PBFT) with random master node selection, which has high communication overhead and a small supported network size, this paper proposes a Byzantine fault tolerant consensus algorithm based on credit (CBFT) enhanced with ...
Due to the swift advancement of the Internet of Things (IoT), there has been a significant surge in the quantity of interconnected IoT devices that send and exchange vital data across the network. Nevertheless, the frequency of attacks on the Internet of