Detailed Information

Cited 26 time in webofscience Cited 48 time in scopus
Metadata Downloads

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Sang-Woong-
dc.contributor.authorSidqi, Haval Mohammed-
dc.contributor.authorMohammadi, Mokhtar-
dc.contributor.authorRashidi, Shima-
dc.contributor.authorRahmani, Amir Masoud-
dc.contributor.authorMasdari, Mohammad-
dc.contributor.authorHosseinzadeh, Mehdi, M.-
dc.date.accessioned2021-07-04T03:40:49Z-
dc.date.available2021-07-04T03:40:49Z-
dc.date.created2021-06-21-
dc.date.issued2021-08-01-
dc.identifier.issn1084-8045-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81477-
dc.description.abstractProviding a high-performance Intrusion Detection System (IDS) can be very effective in controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative impacts of the security attacks on computer systems and networks, various Artificial Intelligence (AI)-based techniques have been used to introduce versatile IDS approaches. Deep learning is a branch of AI techniques, mainly based on multi-layer artificial neural networks. Recently, deep learning techniques have gained momentum in the intrusion detection domain and several IDS approaches are provided in the literature using various deep neural networks to deal with privacy concerns and security threats. For this purpose, this article focuses on the deep IDS approaches and investigates how deep learning networks are employed by different approaches in different steps of the intrusion detection process to achieve better results. It classifies the studied IDS schemes regarding the deep learning networks utilized in them and describes their main contributions and capabilities. Besides, in each category, their main features such as evaluated metrics, datasets, simulators, and environments are compared. Also, a comparison of the deep IDS approaches main properties are provided to illuminate the main techniques applied in them as well as the area less focused in the literature. Finally, the concluding remarks in the deep IDS context are provided and possible directions at the subsequent studies are listed. © 2021 Elsevier Ltd-
dc.language영어-
dc.language.isoen-
dc.publisherACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD-
dc.relation.isPartOfJOURNAL OF NETWORK AND COMPUTER APPLICATIONS-
dc.titleTowards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000658740000004-
dc.identifier.doi10.1016/j.jnca.2021.103111-
dc.identifier.bibliographicCitationJOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.187-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85107876722-
dc.citation.titleJOURNAL OF NETWORK AND COMPUTER APPLICATIONS-
dc.citation.volume187-
dc.contributor.affiliatedAuthorLee, Sang-Woong-
dc.contributor.affiliatedAuthorHosseinzadeh, Mehdi, M.-
dc.type.docTypeReview-
dc.subject.keywordAuthorAuto-encoder-
dc.subject.keywordAuthorCNN-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorDNN-
dc.subject.keywordAuthorGAN-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorLSTM-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusDeep neural networks-
dc.subject.keywordPlusIntrusion detection-
dc.subject.keywordPlusLearning systems-
dc.subject.keywordPlusMultilayer neural networks-
dc.subject.keywordPlusNetwork layers-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusComprehensive analysis-
dc.subject.keywordPlusIntrusion Detection Systems-
dc.subject.keywordPlusLearning network-
dc.subject.keywordPlusLearning techniques-
dc.subject.keywordPlusMalicious behavior-
dc.subject.keywordPlusPrivacy concerns-
dc.subject.keywordPlusSecurity attacks-
dc.subject.keywordPlusSecurity threats-
dc.subject.keywordPlusDeep learning-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 소프트웨어학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hosseinzadeh, Mehdi photo

Hosseinzadeh, Mehdi
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE