2020
DOI: 10.1109/access.2020.2986882
|View full text |Cite
|
Sign up to set email alerts
|

AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection

Abstract: Deep Learning has been widely applied to problems in detecting various network attacks. However, no cases on network security have shown applications of various deep learning algorithms in real-time services beyond experimental conditions. Moreover, owing to the integration of high-performance computing, it is necessary to apply systems that can handle large-scale traffic. Given the rapid evolution of web-attacks, we implemented and applied our Artificial Intelligence-based Intrusion Detection System (AI-IDS).… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 165 publications
(71 citation statements)
references
References 29 publications
0
52
0
1
Order By: Relevance
“…To calculate the selected evaluation method, confusion matrix metrics were used, which are commonly used in machine learning. As shown in Table 5, the confusion matrix [55] comprises four information points. Based on these four information points, four scales can be evaluated, as shown in Table 6 [55].…”
Section: Evaluation Environment and Metricsmentioning
confidence: 99%
“…To calculate the selected evaluation method, confusion matrix metrics were used, which are commonly used in machine learning. As shown in Table 5, the confusion matrix [55] comprises four information points. Based on these four information points, four scales can be evaluated, as shown in Table 6 [55].…”
Section: Evaluation Environment and Metricsmentioning
confidence: 99%
“…In addition, neural network and other deep learning methods are used in network intrusion detection. Kim et al [8] proposed an Artificial Intelligence-based Intrusion Detection System (AIIDS), which is an optimal CNN-LSTM model based on spatial feature learning and successfully applied payload-level deep learning techniques in a highperformance computing environment. In order to better protect the privacy issues of the security operation centers, Khayati et al [14] developed a protocol for privately evaluating detection models on the system data, in which privacy of both the system data and detection models is protected and information leakage is either prevented altogether or quantifiably decreased.…”
Section: A Intrusion Detection Systemmentioning
confidence: 99%
“…Its basic idea is to detect anomaly behaviors that deviate from the normal features or distributions of network traffic, which facilitates and enables the identification of unknown attacks [5]. Recently, many advanced machine learning algorithms VOLUME 4, 2016 have been successfully implemented to enhance the performance of AIDSs [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, with the prosperity and development of machine learning techniques, more and more researcher try to use machine learning method to deal with IDS problem [13]- [16]. Lots of scholars have used Support Vector Machine (SVM) [17]- [19], Convolutional Neural Network (CNN) [20]- [23], Recurrent Neural Network (RNN) [24], [25], Long Short-Term Memory (LSTM) [26]- [30],Gated Recurrent Unit (GRU) [34]- [36], ensemble learning method [31]- [33],especially Gradient Boosting Decision Tree (GBDT) [37]- [41] and many other kinds of machine learning meth-ods in IDS. Those methods have efficiently improved the classification accuracy.…”
Section: Introductionmentioning
confidence: 99%