2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Sma 2022
DOI: 10.1109/bigdatasecurityhpscids54978.2022.00034
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Detection techniques (the data needed for analysis) are classified as knowledge-based or behaviour-based, depending on the source of the data (the audit source). To assess the performance of an IDS, the receiver operating characteristics (ROC) curve is used, which shows the probability of detection versus the likelihood of a false alarm [49]. Because of limited testbed availability and a lack of data from actual incidents, IDS research for smart manufacturing and IoT systems is in its infancy and faces many challenges.…”
Section: Dt and The Iotmentioning
confidence: 99%
“…Detection techniques (the data needed for analysis) are classified as knowledge-based or behaviour-based, depending on the source of the data (the audit source). To assess the performance of an IDS, the receiver operating characteristics (ROC) curve is used, which shows the probability of detection versus the likelihood of a false alarm [49]. Because of limited testbed availability and a lack of data from actual incidents, IDS research for smart manufacturing and IoT systems is in its infancy and faces many challenges.…”
Section: Dt and The Iotmentioning
confidence: 99%
“…Different algorithms were used: XGBoost [45], Decision Tree [43], random forest (RF) [46], and support vector machine (SVM) [47]. [48] used three benchmark datasets, NSL-KDD, CIC-IDS2018, and TON IoT, to offer a three-tiered DL-based technique for identifying abnormal network intrusion behaviors. The proposed framework combines K-means clustering, GANomaly, and CNN techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers in [12] presented a DL framework to build an AIDS. Specifically, this solution consists of three different stages, which are a combination of unsupervised K-means clustering, semisupervised GANomaly, and supervised learning CNN architecture.…”
Section: Existing Workmentioning
confidence: 99%