2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA) 2021
DOI: 10.1109/icaeca52838.2021.9675513
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System using Deep Neural Networks (DNN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Another important area where deep learning has been applied is in anomaly detection for identifying network faults. Navya et al [34] proposed a deep learning-based method for detecting network anomalies and achieved a high precision in their results. Furthermore, Naseer et al [35] utilized a deep residual learning network for intrusion detection in wireless sensor networks, achieving higher accuracy over baseline methods.…”
Section: Related Workmentioning
confidence: 99%
“…Another important area where deep learning has been applied is in anomaly detection for identifying network faults. Navya et al [34] proposed a deep learning-based method for detecting network anomalies and achieved a high precision in their results. Furthermore, Naseer et al [35] utilized a deep residual learning network for intrusion detection in wireless sensor networks, achieving higher accuracy over baseline methods.…”
Section: Related Workmentioning
confidence: 99%
“…Traditional DNNs are frequently utilised in attack and threat detection [20]. The deep learning architecture uses many neurons to introduce non-linearity in classification hypotheses, thereby increasing classification complexity.…”
Section: B: Lstmmentioning
confidence: 99%
“…In [20], authors, claim in the paper, that by using DNN, a sort of deep learning model enables the development of a flexible and effective IDS for detecting and classifying unanticipated and unpredictable cyberattacks. However, they did not add simulations to prove their statement, and they do not clearly show the proof of concept.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A SIEM system is able to detect harmful behavior while avoiding false positives because it correlates data from several sources and uses advanced techniques of alert filtering. [2] Although there are many more types of intrusion detection systems, two of the most common kinds are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) (HIDS). Examples of network intrusion detection systems (NIDS) include systems that analyze incoming network traffic, whereas examples of host intrusion detection systems (HIDS) include systems that monitor important operating system files.…”
Section: Introductionmentioning
confidence: 99%