{"title":"DNNIDS: A Novel Network Intrusion Detection Based on Deep Neural Network","authors":"Chia-Fen Hsieh, Che-Min Su","doi":"10.1109/ICASI52993.2021.9568439","DOIUrl":null,"url":null,"abstract":"With the rapid development of the network, network security is a relatively important issue. However, traditional intrusion detection systems based on feature selection and classification have some drawbacks, such as processing redundant information and increasing computational time. This paper proposes Intrusion Detection System based on Deep Neural Network (DNNIDS). Our method includes preprocessing stage, model establishment stage, and test stage. Deep Learning (DL) can automatically extract features. Compared with other methods, this method can improve the accuracy to detect attack types.","PeriodicalId":103254,"journal":{"name":"2021 7th International Conference on Applied System Innovation (ICASI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 7th International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI52993.2021.9568439","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the rapid development of the network, network security is a relatively important issue. However, traditional intrusion detection systems based on feature selection and classification have some drawbacks, such as processing redundant information and increasing computational time. This paper proposes Intrusion Detection System based on Deep Neural Network (DNNIDS). Our method includes preprocessing stage, model establishment stage, and test stage. Deep Learning (DL) can automatically extract features. Compared with other methods, this method can improve the accuracy to detect attack types.