2020
DOI: 10.1016/j.knosys.2019.105124
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
187
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 439 publications
(214 citation statements)
references
References 32 publications
0
187
0
1
Order By: Relevance
“…Since a considerable amount of literature exists in the broad area of network intrusion detection, this inclusion criteria has been adopted for selection of most recent and highly relevant papers for this study. Interested readers can refer to surveys on broad area of detection of DDoS attacks available in [12], [13], [14].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since a considerable amount of literature exists in the broad area of network intrusion detection, this inclusion criteria has been adopted for selection of most recent and highly relevant papers for this study. Interested readers can refer to surveys on broad area of detection of DDoS attacks available in [12], [13], [14].…”
Section: Related Workmentioning
confidence: 99%
“…Various solutions based on packet-level analyses, flowlevel analyses, behavioral analyses, traffic mining and deep packet inspection of network traffic, have been proposed by researchers for combating DDoS attacks [6]- [11]. Recent advances in machine learning and deep learning techniques have also been employed for detection of DDoS attacks [12]- [14].…”
Section: Introductionmentioning
confidence: 99%
“…Security information event management solutions [127], [128], [157] utilize ML to detect ongoing security threats, anomalies, and intrusions in network elements and orchestrate automated responses. Human approval and surveillance can be part of reactive ML-based security solutions, particularly when the correct autonomous behavior in every situation cannot be trusted.…”
Section: ) Reactive Defenses In 5g Platformsmentioning
confidence: 99%
“…In addition, with the proliferation of DNN and its deployment in different fields and applications, a set of works has been proposed in the literature to assess its applicability for anomaly detection [49,50]. In this context, deep learning-based abnormality detection solutions receive an increasing interest [51].…”
Section: Machine Learning-based Techniquesmentioning
confidence: 99%