2021 International Conference on Recent Trends on Electronics, Information, Communication &Amp; Technology (RTEICT) 2021
DOI: 10.1109/rteict52294.2021.9573685
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis of Deep Learning Approaches in Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…The associated transference and storage of vast volumes of data over computer networks have created new and evolving opportunities for cybercriminals [1]. From 2019 to 2022, the cost of repairing cyberattack damage increased by USD 6T, and the average detection time increased from 57.4 to 93.2 days [2]. Traditional cybersecurity methods (e.g., firewalls, user authentication, and data encryption) cannot handle the complex attacks that take place online.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The associated transference and storage of vast volumes of data over computer networks have created new and evolving opportunities for cybercriminals [1]. From 2019 to 2022, the cost of repairing cyberattack damage increased by USD 6T, and the average detection time increased from 57.4 to 93.2 days [2]. Traditional cybersecurity methods (e.g., firewalls, user authentication, and data encryption) cannot handle the complex attacks that take place online.…”
Section: Introductionmentioning
confidence: 99%
“…(1) We apply a novel combination of data-and algorithm-level techniques to specifically reduce the FP rate while improving the model's recall rate. (2) We provide legitimate and reproducible results by applying our combined model to state-of-the-art NSL-KDD [7] and CICIDS2017 [8] benchmark intrusion detection datasets as our research objects. (3) To improve data-level class balancing, we provide an ingenious combination of random undersampling (RUS) and synthetic minority oversampling to adjust the data distribution structure and improve minority class detection.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, it also focuses on the techniques of IDS and the datasets used by researchers to develop IDS. The studies [8][9][10][11][12] illustrate the comparative analysis of ML and DL approaches in intrusion detection. In articles [13][14][15][16], the authors comprehensively explain about the ML algorithms for intrusion detection along with the detailed explanation of the datasets and challenges for modern scenario.…”
Section: Introductionmentioning
confidence: 99%
“…Attacks between 100 Gbps and 400 Gbps increased by 776% globally between 2018 and 2019, and the total number of DDoS attacks will double from 7.9 million in 2018 to 15.4 million by 2023. NIDS must be constantly improved to avoid malicious activity before it occurs as attackers always come up with new ways to exploit the network [8]. The authors in [9] highlight the research challenges in the field of IDS as follows: (i) systematic construction of an up-to-date dataset with enough instances of almost all the attack types; (ii) lower detection accuracy due to the imbalance dataset; (iii) low performance in a real-world environment; (iv) most of the IDS approaches suggested by the researcher are based on extremely sophisticated models requiring a lot of processing time and computing power.…”
Section: Introductionmentioning
confidence: 99%