2021
DOI: 10.9734/ajrcos/2021/v9i430229
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Approaches for Intrusion Detection

Abstract: Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a detailed comparison with evaluating performance, deep learning algorithms for detecting attacks, feature learning, and datasets used to identify the advantages of emplo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 50 publications
0
6
0
Order By: Relevance
“…These models classify data transfers based on the characteristics of various attacks. In addition, the authors gave an overview of intrusion detection system datasets [10]. Network Security Laboratory Knowledge Discovery in Databases (NSL-KDD), and Community Integrated Cyber Intelligence Data Sharing (CICIDS2017) are public datasets with the features of cyberattacks represented by various IDS datasets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These models classify data transfers based on the characteristics of various attacks. In addition, the authors gave an overview of intrusion detection system datasets [10]. Network Security Laboratory Knowledge Discovery in Databases (NSL-KDD), and Community Integrated Cyber Intelligence Data Sharing (CICIDS2017) are public datasets with the features of cyberattacks represented by various IDS datasets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…On the face of it, the device monitoring seems to be done for the sake of speed; behind the scenes, though, its objective is to discover disturbances, issues, or dangers. Typical for web-servers, the control system is usually is mounted on a separate computer and is configured to keep track of other computers and software [37]. Today, the network is the only place to get to knowledge and records.…”
Section: Software As a Service (Saas)mentioning
confidence: 99%
“…Lastly, Salih et al [30] proposed a model for improving the performance of network intrusion detection systems. The author used an Anaconda Python open-source platform to deploy a set of algorithms for selecting features for authentication.…”
Section: Related Workmentioning
confidence: 99%