Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
- Authors
- Lee, Sang-Woong; Sidqi, Haval Mohammed; Mohammadi, Mokhtar; Rashidi, Shima; Rahmani, Amir Masoud; Masdari, Mohammad; Hosseinzadeh, Mehdi, M.
- Issue Date
- 1-Aug-2021
- Publisher
- ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
- Keywords
- Auto-encoder; CNN; Deep learning; DNN; GAN; Intrusion detection; LSTM
- Citation
- JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.187
- Journal Title
- JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Volume
- 187
- URI
- https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81477
- DOI
- 10.1016/j.jnca.2021.103111
- ISSN
- 1084-8045
- Abstract
- Providing a high-performance Intrusion Detection System (IDS) can be very effective in controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative impacts of the security attacks on computer systems and networks, various Artificial Intelligence (AI)-based techniques have been used to introduce versatile IDS approaches. Deep learning is a branch of AI techniques, mainly based on multi-layer artificial neural networks. Recently, deep learning techniques have gained momentum in the intrusion detection domain and several IDS approaches are provided in the literature using various deep neural networks to deal with privacy concerns and security threats. For this purpose, this article focuses on the deep IDS approaches and investigates how deep learning networks are employed by different approaches in different steps of the intrusion detection process to achieve better results. It classifies the studied IDS schemes regarding the deep learning networks utilized in them and describes their main contributions and capabilities. Besides, in each category, their main features such as evaluated metrics, datasets, simulators, and environments are compared. Also, a comparison of the deep IDS approaches main properties are provided to illuminate the main techniques applied in them as well as the area less focused in the literature. Finally, the concluding remarks in the deep IDS context are provided and possible directions at the subsequent studies are listed. © 2021 Elsevier Ltd
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - IT융합대학 > 소프트웨어학과 > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81477)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.