91
Views
0
CrossRef citations to date
0
Altmetric
Computers and Computing

An Optimal Reinforced Deep Belief Network for Detection of Malicious Network Traffic

&

References

  • H. Yao, P. Gao, J. Wang, P. Zhang, C. Jiang, and Z. Han, “Capsule network assisted IoT traffic classification mechanism for smart cities,” IEEE Internet Things J., Vol. 6, no. 5, pp. 7515–7525, 2019. doi:10.1109/JIOT.2019.2901348
  • Z. Yao, J. Ge, Y. Wu, X. Lin, R. He, and Y. Ma, “Encrypted traffic classification based on Gaussian mixture models and hidden markov models,” J. Netw. Comput. Appl., Vol. 166, pp. 102711, 2020. doi:10.1016/j.jnca.2020.102711
  • Y. Boujelben, “Scalable and QoS-aware resource allocation to heterogeneous traffic flows in 5G,” IEEE Internet Things J., Vol. 8, no. 20, pp. 15568–15581, 2021. doi:10.1109/JIOT.2021.3074111
  • X. Ma, X. Li, X. Tang, B. Zhang, R. Yao, and J. Lu, “Deconvolution feature fusion for traffic signs detection in 5G driven unmanned vehicle,” Physical Commun., Vol. 47, pp. 101375, 2021. doi:10.1016/j.phycom.2021.101375
  • J. Guan, J. Cai, H. Bai, and I. You, “Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems,” Int. J. Machine Learning Cybernetics, Vol. 12, no. 11, pp. 3351–3365, 2021. doi:10.1007/s13042-021-01415-4
  • M. Afaq, J. Iqbal, T. Ahmed, I. U. Islam, M. Khan, and M. S. Khan, “Towards 5G network slicing for vehicular ad-hoc networks: An end-to-end approach,” Comput. Commun., Vol. 149, pp. 252–258, 2020. doi:10.1016/j.comcom.2019.10.018
  • S. A. Kumar, A. Suresh, S. R. Anand, K. Chokkanathan, and M. Vijayasarathy, “Hybridization of mean shift clustering and deep packet inspected classification for network traffic analysis,” Wirel. Pers. Commun., 1–17, 2021.
  • S. Izadi, M. Ahmadi, and A. Rajabzadeh, “Network traffic classification using deep learning networks and Bayesian data fusion,” J. Netw. Syst. Manage., Vol. 30, no. 2, pp. 1–21, 2022. doi:10.1007/s10922-021-09639-z
  • T. ZOU, Y. WANG, and C. WU, “Review of network background traffic classification and identification,” J. Comput. Applic., Vol. 39, no. 3, pp. 802, 2019.
  • S. Soleymanpour, H. Sadr, and M. N. Soleimandarabi, “CSCNN: cost-sensitive convolutional neural network for encrypted traffic classification,” Neural Process. Lett., Vol. 53, no. 5, pp. 3497–3523, 2021. doi:10.1007/s11063-021-10534-6
  • S. Izadi, M. Ahmadi, and A. Rajabzadeh, “Network traffic classification using deep learning networks and Bayesian data fusion,” J. Netw. Syst. Manage., Vol. 30, no. 2, pp. 1–21, 2022. doi:10.1007/s10922-021-09639-z
  • J. Li, Z. Zhao, and R. Li, “Machine learning-based IDS for software-defined 5G network,” Iet Networks, Vol. 7, no. 2, pp. 53–60, 2018. doi:10.1049/iet-net.2017.0212
  • H. Yao, P. Gao, J. Wang, P. Zhang, C. Jiang, and Z. Han, “Capsule network assisted IoT traffic classification mechanism for smart cities,” IEEE Internet Things J., Vol. 6, no. 5, pp. 7515–7525, 2019. doi:10.1109/JIOT.2019.2901348
  • Z. Bu, B. Zhou, P. Cheng, K. Zhang, and Z. H. Ling, “Encrypted network traffic classification using deep and parallel network-in-network models,” IEEE. Access., Vol. 8, pp. 132950–132959, 2020. doi:10.1109/ACCESS.2020.3010637
  • M. Shafiq, X. Yu, A. K. Bashir, H. N. Chaudhry, and D. Wang, “A machine learning approach for feature selection traffic classification using security analysis,” J. Supercomput., Vol. 74, no. 10, pp. 4867–4892, 2018. doi:10.1007/s11227-018-2263-3
  • G. Sun, L. Liang, T. Chen, F. Xiao, and F. Lang, “Network traffic classification based on transfer learning,” Comput. Electr. Eng., Vol. 69, pp. 920–927, 2018. doi:10.1016/j.compeleceng.2018.03.005
  • S. A. Kumar, A. Suresh, S. R. Anand, K. Chokkanathan, and M. Vijayasarathy, “Hybridization of mean shift clustering and deep packet inspected classification for network traffic analysis,” Wirel. Pers. Commun., pp. 1–17, 2021.
  • J. Guan, J. Cai, H. Bai, and I. You, “Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems,” Int. J. Machine Learning Cybernetics, Vol. 12, no. 11, pp. 3351–3365, 2021. doi:10.1007/s13042-021-01415-4
  • X. Wang, G. Huang, Z. Zhou, W. Tian, J. Yao, and J. Gao, “Radar emitter recognition based on the energy cumulant of short time Fourier transform and reinforced deep belief network,” Sensors, Vol. 18, no. 9, pp. 3103, 2018. doi:10.3390/s18093103
  • Y. Xing, J. Yue, C. Chen, Y. Xiang, Y. Chen, and M. Shi, “A deep belief network combined with modified grey wolf optimization algorithm for PM2.5 concentration prediction,” Applied Sci., Vol. 9, no. 18, pp. 3765, 2019. doi:10.3390/app9183765
  • M. Roder, L. A. Passos, G. H. de Rosa, V. H. C. de Albuquerque, and J. P. Papa, “Reinforcing learning in deep belief networks through nature-inspired optimization,” Appl. Soft. Comput., Vol. 108, pp. 107466, 2021. doi:10.1016/j.asoc.2021.107466
  • M. C. Su, J. H. Chen, A. M. Utami, S. C. Lin, and H. H. Wei, “Dove swarm optimization algorithm,” IEEE. Access., Vol. 10 pp. 46690–46696, 2022.
  • X. Wang, G. Huang, Z. Zhou, W. Tian, Y. J. ao, and J. Gao, “Radar emitter recognition based on the energy cumulant of short time Fourier transform and reinforced deep belief network,” Sensors, Vol. 18, no. 9, pp. 3103, 2018. doi:10.3390/s18093103

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.