2021
DOI: 10.1109/access.2021.3082160
|View full text |Cite
|
Sign up to set email alerts
|

Host-Based Intrusion Detection Model Using Siamese Network

Abstract: As cyberattacks become more intelligent, the difficulty increases for traditional intrusion detection systems to detect advanced attacks that deviate from previously stored patterns. To solve this problem, a deep learning-based intrusion detection system model has emerged that analyzes intelligent attack patterns through data learning. However, deep learning models have the disadvantage of having to re-learn each time a new cyberattack method emerges. The time required to learn a large amount of data is not ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Poor detection accuracy and execution efficiency on small samples Park et al [20] Building twin convolutional neural networks using small-sample learning methods to extract time-dependent dynamic features in traffic Relatively low detection performance Zhou et al [21] Proposed an incremental long short-term memory-based method to detect attacks Weak detection of stealth attacks Ashraf et al [22] Detecting attacks based on long short-term memory networks and autoencoders Serial spatio-temporal feature extraction is susceptible to the impact of the previous sub-model Liu et al. [23] Collaborative intrusion detection based on blockchain and federated learning High communication overhead Chen et al [24] Increase the weight of important nodes based on the attention mechanism to reduce the overhead of federated intrusion detection Depends on the consistency and stability of the global model Attota et al [25] Improving learning efficiency for different classes of attacks using multi-view ensemble learning computational and communication overheads impact nodes…”
Section: Internet Of Vehicle Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Poor detection accuracy and execution efficiency on small samples Park et al [20] Building twin convolutional neural networks using small-sample learning methods to extract time-dependent dynamic features in traffic Relatively low detection performance Zhou et al [21] Proposed an incremental long short-term memory-based method to detect attacks Weak detection of stealth attacks Ashraf et al [22] Detecting attacks based on long short-term memory networks and autoencoders Serial spatio-temporal feature extraction is susceptible to the impact of the previous sub-model Liu et al. [23] Collaborative intrusion detection based on blockchain and federated learning High communication overhead Chen et al [24] Increase the weight of important nodes based on the attention mechanism to reduce the overhead of federated intrusion detection Depends on the consistency and stability of the global model Attota et al [25] Improving learning efficiency for different classes of attacks using multi-view ensemble learning computational and communication overheads impact nodes…”
Section: Internet Of Vehicle Intrusion Detectionmentioning
confidence: 99%
“…Hu et al [19] implemented a wireless network intrusion detection system using adaptive synthetic sampling and a convolutional neural network implemented by a split convolutional module to increase the diversity of spatial features and reduce the impact of inter-channel information redundancy on the model. Park et al [20] convert network traffic into grayscale maps and build twinned convolutional neural networks based on small sample-learning methods to determine the type of attack based on the similarity scores of attack samples. To capture the timedependent dynamic features in network traffic, Zhou et al [21] proposed an incremental long and short-term memory network intrusion detection method that introduces state changes into LSTM and processes dynamic information in network data by obtaining the state of the LSTM implicit layer.…”
Section: Intrusion Detection Based On Deep Learningmentioning
confidence: 99%
“…Keeping the focus on HIDS in [73], Gas-sais et al propose a framework for intrusion detection in IoT which combines user and kernel space using AI techniques to automatically get devices behavior, process the data into numeric arrays to train several machine learning algorithms, and raise alerts whenever an intrusion is found. In [74] and [75] the authors focus the attention on Cloud Environment by detecting Anomalies while [76] propose a Siamese-CNN to determine the attack type converting it to an image. Analyzing the Network-based approaches, in [77], the authors present a NIDS model that employs a non-symmetric deep AutoEncoder and a Random Forest classifier.…”
Section: ) Artificial Intelligence In Idssmentioning
confidence: 99%
“…99.16% accuracy is achieved on the UNSW-NB dataset and 99.99% on the CICIDS dataset. Park et al (2021) proposes a technique called HIIDS, which is hybrid intelligent IDS. This technique learns important and most relevant features from the dataset.…”
Section: Related Workmentioning
confidence: 99%