Chrome Extension
WeChat Mini Program
Use on ChatGLM

A Neural Network Component for an Intrusion Detection System

H DEBAR, M BECKER,D SIBONI

Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy

Cited 859|Views4
Abstract
In this paper, we present a possible application of neural networks as a component of an intrusion detection system. Neural network algorithms are emerging nowadays as a new artificial intelligence technique that can be applied to real-life problems. We present an approach of user behavior modeling that takes advantage of the properties of neural algorithms and display results obtained on preliminary testing of our approach.
More
Translated text
Key words
neural algorithm,neural network,neural network algorithm,display result,intrusion detection system,new artificial intelligence technique,possible application,preliminary testing,real-life problem,user behavior modeling,Intrusion Detection System,Neural Network Component
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper

要点】:本文提出将神经网络作为入侵检测系统的一个组件,并展示了基于用户行为建模的方法及初步测试结果。创新点在于应用新兴的神经网络算法解决实际问题。

方法】:采用神经网络算法来建模用户行为。

实验】:通过初步测试展示了该方法在入侵检测上的效果,数据集未明确提及。