2020
DOI: 10.1007/s12243-019-00743-5
|View full text |Cite
|
Sign up to set email alerts
|

Improving threat detection in networks using deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…By using DL techniques, we can model a prediction system that is effective and adaptive in exploring and classifying volatile and unpredicted intrusions, which are inherent in dynamic attack techniques. A large portion of the study is lacking in the examination of features' misperception related aspects during learning, as well as in the assessment of false-positive (FP) and false-negative (FN) rates during prediction [7,8,21,25].…”
Section: Figure 1: Proposed Ids Framework Environmentmentioning
confidence: 99%
“…By using DL techniques, we can model a prediction system that is effective and adaptive in exploring and classifying volatile and unpredicted intrusions, which are inherent in dynamic attack techniques. A large portion of the study is lacking in the examination of features' misperception related aspects during learning, as well as in the assessment of false-positive (FP) and false-negative (FN) rates during prediction [7,8,21,25].…”
Section: Figure 1: Proposed Ids Framework Environmentmentioning
confidence: 99%
“…Unfortunately, KDD-99 has numerous flaws that make it unsuitable for current applications, including its age, excessively skewed goals, inconstant across training and test data sets, pattern duplication and irrelevant features. Tavallaee et al (2009) proposed NSL-KDD, a more balanced resampling of KDD-99 (Saba, 2020; Begli et al , 2019; Alrawashdeh and Purdy, 2016; Lin et al , 2018; Yang et al , 2019; Schuartz et al , 2020) have considered the KDD-Cup99 data set to demonstrate machine learning and deep learning algorithms to evaluate the proposed method performance, as mentioned in Table 1. But both data set lacks contemporary cyber-attack samples and is considered outdated and does not include recent IoT botnet attack samples.…”
Section: Literature Surveymentioning
confidence: 99%
“…The results are evaluated, analyzed and their effects are discussed. (Saba, 2020;Begli et al, 2019;Alrawashdeh and Purdy, 2016;Lin et al, 2018;Yang et al, 2019;Schuartz et al, 2020) have considered the KDD-Cup99 data set to demonstrate machine learning and deep learning algorithms to evaluate the proposed method performance, as mentioned in Table 1. But both data set lacks contemporary cyber-attack samples and is considered outdated and does not include recent IoT botnet attack samples.…”
Section: Introductionmentioning
confidence: 99%
“…In 2020 Schwartz F. et al [97] focused on dimension reduction to reduce complicated and reducing time for building model. An autoencoder (AE) is a deep neural network used to reduce the big data with, Autoencoder (SAE) for feature extraction to reduce the feature space.…”
Section: Auto-encoder (Ae)mentioning
confidence: 99%