Image data are becoming the most common type of information sent over networks, thanks to advancements in information technology. The advancement of picture encryption technology is occurring concurrently with the gro...
详细信息
In order to solve the problem of incomplete tree hazard inspection in UAV laser ranging, it is proposed to use laser point cloud data to predict tree hazard of power line. This paper uses the improved KDTree to automa...
详细信息
With the increasing integration of distributed renewable energy sources into distribution networks, the characteristics of fault currents in distribution networks have undergone significant changes. Traditional three-...
详细信息
The electrical fire monitoring mode is mostly set to one-way mode, which can achieve the expected monitoring task, but lacks stability and reliability, and it is difficult to achieve coordination and positioning monit...
详细信息
Vehicular Ad Hoc Networks (VANETs) are considered crucial for real-time vehicle-to-vehicle communication, which in turn enhances the efficiency of traffic and road safety. VANETs are very vulnerable to Denial-of-Servi...
详细信息
The technique of embedding the owner’s valid copyright information in an audio signal is known as digital audio watermarking. research in this field has primarily focused on the trade-off between imperceptibility, pa...
详细信息
Federated understanding techniques have actually shown prospective, in the medical care sector allowing cooperation as well as information sharing while promoting personal privacy and also safety and security steps. T...
The rapid development of electronic information and communication technology has led to the widespread use of a variety of marine monitoring technologies, including aerospace remote sensors, automatic buoys, multi-bea...
详细信息
A major obstacle in the face of increasingly complex cyberattacks is network security. Proactive security measures require effective intrusion detection systems (IDS) that can precisely classify and categorize network...
详细信息
ISBN:
(纸本)9791188428137
A major obstacle in the face of increasingly complex cyberattacks is network security. Proactive security measures require effective intrusion detection systems (IDS) that can precisely classify and categorize network threats. In order to improve network attack detection and classification, this paper proposes a reliable method utilizing a Feedforward Neural Network (FFNN) supplemented with Adaptive Synthetic (ADASYN) sampling. We created a model using the UNSWNB15 dataset that efficiently handles high-dimensional datasets by preprocessing data using a combination of polynomial feature transformation and one-hot encoding. The FFNN model is optimized for binary and multi-class classification tasks. It consists of layers of dense units with dropout and batch normalization. Our method’s efficacy is proven by rigorous training and validation procedures, where the model significantly increased its ability to handle class imbalances and improve classification accuracy. The synthesis of new training data by ADASYN was crucial in improving model performance, especially in underrepresented classes. Evaluation measures that highlight the potential of deep learning in network security applications are ROC-AUC scores and classification reports, which show a notable improvement in our IDS’s detection capabilities. The results show that advanced machine learning techniques can be used to enhance conventional intrusion detection systems and provide a means to build stronger network security designs. Copyright 2025 Global IT research Institute (GIRI). All rights reserved.
Dengue fever poses a significant health challenge, necessitating efficient resource allocation. Complex internal and external factors contribute to non-linear fluctuations in dengue fever occurrences, making resource ...
详细信息
暂无评论