ARCHIVES
Enhanced Cybersecurity via Deep LSTM Networks for Intrusion Detection
Published Online: September-December 2024
Pages: 17-19
Cite this article
No DOIAbstract
Deep Long Short-Term Memory Recurrent Neural network (LSTM-RNN) methodology is consists of pre-processing, training and testing phases. The raw data attributes consist of numerical and non-numerical values. Non-numerical values need to be conversion of numerical values because the LSTM-RNN model requires numerical attribute values as input. The numericalization process can be done with one-hot encoding. One-hot encoding assigns unique feature values to the non-numerical features. Some numerical zed data attributes consist of large feature value and some attributes consist of minimum value. The difference between minimum feature value and maximum feature value is very large. This difference affects the original feature values. The normalization process avoids the effectiveness of the original feature values. Normalization could be done with min-max normalization.
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024