Paper
16 January 2025 University network intrusion detection method based on deep learning
Huang Zhong
Author Affiliations +
Proceedings Volume 13447, International Conference on Mechatronics and Intelligent Control (ICMIC 2024); 1344730 (2025) https://doi.org/10.1117/12.3045018
Event: International Conference on Mechatronics and Intelligent Control (ICMIC 2024), 2024, Wuhan, China
Abstract
With the increasing number of network attacks, the network security of universities has been threatened unprecedentedly. This study explores a deep learning-based method for network intrusion detection in colleges and universities. Firstly, the development of network intrusion detection technology is reviewed, and the characteristics of university network environment are analyzed emphatically. Furthermore, the quality and representativeness of the data are ensured through sophisticated data preprocessing strategies. On this basis, an appropriate deep learning model is selected, and the configuration is optimized for the university network environment. After the system was deployed in real time, it was verified on multiple data sets, and the results showed that the model had high accuracy, precision and recall, showing strong generalization ability. The conclusion part confirms the effectiveness of deep learning technology in network intrusion detection in colleges and universities, and provides a new research direction and practical reference for the field of network security.
(2025) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Huang Zhong "University network intrusion detection method based on deep learning", Proc. SPIE 13447, International Conference on Mechatronics and Intelligent Control (ICMIC 2024), 1344730 (16 January 2025); https://doi.org/10.1117/12.3045018
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Computer intrusion detection

Deep learning

Education and training

Performance modeling

Data processing

Network security

Back to Top