2020 International Conference on Computing, Networking and Communications (ICNC) 2020
DOI: 10.1109/icnc47757.2020.9049796
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Protocol-based Intrusion Detection for Real-world Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Furthermore, IPTABLES relies on a threshold to count the number of active connections, which can create false positive errors. An advanced policy firewall (APF) [19] can also be used to counter this attack, but like IPTABLES, its constraints can also lead to false positive errors [20]. The combination of Apache modules and detection tools can also be used in a cloud computing environment [21].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, IPTABLES relies on a threshold to count the number of active connections, which can create false positive errors. An advanced policy firewall (APF) [19] can also be used to counter this attack, but like IPTABLES, its constraints can also lead to false positive errors [20]. The combination of Apache modules and detection tools can also be used in a cloud computing environment [21].…”
Section: Related Workmentioning
confidence: 99%
“…Any malicious intrusion or attack on network vulnerabilities, computers or information systems may result in a serious predicament and violate the confidentiality, integrity and availability of the systems [155]. The examined primary studies are mainly focused on network intrusion detection [110,117,119,121,106,128,129,83,87,131]. However, other applications of GANs in intrusion detection are smartphone lock pattern intrusion detection [112], presentation attack detection [82], phishing detection [114], cognitive radio intrusion detection [76], cyber-physical system intrusion detection [93], and IoT security [19,46].…”
Section: Rq2: What Are the Application Domains Of Anomaly Detection W...mentioning
confidence: 99%
“…As reported in almost all primary studies, it takes a long time and powerful GPUs to train GANs to the point of satisfactory performance. Consequently, future studies need to explore GAN architectures that are lightweight and efficient in terms of resource consumption [22,28,127,89,83]. For instance, the effects of selecting GAN hyperparameters on the anomaly detection performance have not been studied in the literature.…”
Section: Future Research Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Labonne and colleagues also used a deep autoencoder [43], alongside four other neural network architectures, on the CICIDS2017 dataset, comparing the respective anomaly scores. They note that there is an often-missed distinction between traffic classification and attack detection, so they correlate anomaly scores to estimate the probability of a sequence being an attack.…”
Section: Literature Reviewmentioning
confidence: 99%