Traditional vehicle networking resource allocation strategies are difficult to meet diverse high-quality communication needs in high dynamic vehicle scenarios, especially in congested areas such as intersections, whic...
详细信息
In this paper, the application of image processing and machine learning in object recognition is studied. Firstly, a calculation method based on color, size and leaf area ratio is proposed. Through image preprocessing...
详细信息
Blockchain technology's decentralized and immutable data storage has changed a number of sectors. But typical blockchain networks scalability issues prevent them from being widely used for large-scale applications...
详细信息
computernetwork is a tool that can achieve information sharing, with strong interoperability and universality, and can solve various problems in communication systems. However, in practical applications, computer net...
详细信息
This paper proposes an innovative method for detecting SQL injection attacks by leveraging the temporal modeling capabilities of Bidirectional Long Short-Term Memory (Bi-LSTM) neural networks. Our approach captures th...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
This paper proposes an innovative method for detecting SQL injection attacks by leveraging the temporal modeling capabilities of Bidirectional Long Short-Term Memory (Bi-LSTM) neural networks. Our approach captures the sequential relationships between traffic packets before and after an intrusion by utilizing a labeled NetFlow V5 dataset. By introducing timestamp information and reprocessing the dataset, the proposed method effectively learns the temporal characteristics of attacks. Comparative experiments demonstrate the superiority of the Bi-LSTM model over unidirectional LSTM and fully connected neural networks, maintaining a false positive rate below 0.22% on the public test set. Furthermore, by incorporating additional injection traffic features, the model's adaptability and effectiveness in real-world attack scenarios are enhanced. The proposed Bi-LSTM based method provides an accurate and efficient solution for detecting SQL injection attacks by using NetFlow data, highlighting the importance of temporal modeling in network intrusion detection.
As Internet technology is developed and applied, the problems of large amounts of real-time traffic data and many unknown attacks are becoming increasingly serious, and intrusion detection systems have increased in ef...
详细信息
As encrypted traffic becomes increasingly prevalent in modern network communications, effective classification of encrypted traffic is crucial for network security and management. However, existing classification meth...
详细信息
Blockchain technology has garnered increasing attention in recent years, extending its reach beyond its initial application in cryptocurrency to various sectors, including video gaming. This technology, characterized ...
详细信息
In view of the shortcomings of traditional product recommendation algorithms in mining user interests, we proposes a new recommendation algorithm based on heterogeneous graph neural networks. First, a user-item-tag he...
详细信息
With the development of information technology and electric power industry, modern power grid system gradually integrates computer intelligent technology. Distributed photovoltaic network, as an important power supply...
详细信息
暂无评论