The rule-based intrusion detection method matches the characteristic value of network traffic with a set rule value to determine whether or not it is an attack.
Feb 15, 2024 · Shiyu Wang et al. [13] suggested ResNet, Transformer and BiLSTM (Res-TranBiLSTM) method which was utilized for intrusion detection in IoT.
On this basis, we propose an intrusion detection model using ResNet, Transformer and BiLSTM (Res-TranBiLSTM) that takes into account both the spatial and ...
Title. Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things ; Author/Creator. Wang, Shiyu ; Is Part Of. Computer networks ( ...
People also ask
What is intrusion detection in Internet of Things?
What is one of the main approaches to intrusion detection based on?
What is the most used intrusion detection technique?
How do IDS work in IoT?
Aug 1, 2024 · This article addresses this research problem and advances state-of-the-art, bringing contributions to a two-stage detection architecture called DNNET-Ensemble.
Nov 2, 2024 · Liu, "Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things," Computer Networks, vol. 235, p. 109982 ...
Res-TranBiLSTM: An Intelligent Approach for Intrusion Detection in the Internet of Things. Article. Aug 2023; COMPUT NETW. Shiyu Wang · Wenxiang Xu · Yiwen Liu.
S. Wang, W. Xu, and Y. Liu, “Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things”, Computer Networks, vol. 235, pp.109982, ...
This article addresses IoT security and presents an intelligent two-layer intrusion detection system for IoT. The system's intelligence is driven by machine ...
Res-TranBiLSTM: An intelligent approach for intrusion detection in the. Internet of Things. Computer Networks, 2023(235), 1–16. doi:10.1016/j.comnet ...