Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Sang-Woong | - |
dc.contributor.author | Sidqi, Haval Mohammed | - |
dc.contributor.author | Mohammadi, Mokhtar | - |
dc.contributor.author | Rashidi, Shima | - |
dc.contributor.author | Rahmani, Amir Masoud | - |
dc.contributor.author | Masdari, Mohammad | - |
dc.contributor.author | Hosseinzadeh, Mehdi, M. | - |
dc.date.accessioned | 2021-07-04T03:40:49Z | - |
dc.date.available | 2021-07-04T03:40:49Z | - |
dc.date.created | 2021-06-21 | - |
dc.date.issued | 2021-08-01 | - |
dc.identifier.issn | 1084-8045 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81477 | - |
dc.description.abstract | Providing a high-performance Intrusion Detection System (IDS) can be very effective in controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative impacts of the security attacks on computer systems and networks, various Artificial Intelligence (AI)-based techniques have been used to introduce versatile IDS approaches. Deep learning is a branch of AI techniques, mainly based on multi-layer artificial neural networks. Recently, deep learning techniques have gained momentum in the intrusion detection domain and several IDS approaches are provided in the literature using various deep neural networks to deal with privacy concerns and security threats. For this purpose, this article focuses on the deep IDS approaches and investigates how deep learning networks are employed by different approaches in different steps of the intrusion detection process to achieve better results. It classifies the studied IDS schemes regarding the deep learning networks utilized in them and describes their main contributions and capabilities. Besides, in each category, their main features such as evaluated metrics, datasets, simulators, and environments are compared. Also, a comparison of the deep IDS approaches main properties are provided to illuminate the main techniques applied in them as well as the area less focused in the literature. Finally, the concluding remarks in the deep IDS context are provided and possible directions at the subsequent studies are listed. © 2021 Elsevier Ltd | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD | - |
dc.relation.isPartOf | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | - |
dc.title | Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000658740000004 | - |
dc.identifier.doi | 10.1016/j.jnca.2021.103111 | - |
dc.identifier.bibliographicCitation | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.187 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85107876722 | - |
dc.citation.title | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | - |
dc.citation.volume | 187 | - |
dc.contributor.affiliatedAuthor | Lee, Sang-Woong | - |
dc.contributor.affiliatedAuthor | Hosseinzadeh, Mehdi, M. | - |
dc.type.docType | Review | - |
dc.subject.keywordAuthor | Auto-encoder | - |
dc.subject.keywordAuthor | CNN | - |
dc.subject.keywordAuthor | Deep learning | - |
dc.subject.keywordAuthor | DNN | - |
dc.subject.keywordAuthor | GAN | - |
dc.subject.keywordAuthor | Intrusion detection | - |
dc.subject.keywordAuthor | LSTM | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordPlus | Deep neural networks | - |
dc.subject.keywordPlus | Intrusion detection | - |
dc.subject.keywordPlus | Learning systems | - |
dc.subject.keywordPlus | Multilayer neural networks | - |
dc.subject.keywordPlus | Network layers | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Comprehensive analysis | - |
dc.subject.keywordPlus | Intrusion Detection Systems | - |
dc.subject.keywordPlus | Learning network | - |
dc.subject.keywordPlus | Learning techniques | - |
dc.subject.keywordPlus | Malicious behavior | - |
dc.subject.keywordPlus | Privacy concerns | - |
dc.subject.keywordPlus | Security attacks | - |
dc.subject.keywordPlus | Security threats | - |
dc.subject.keywordPlus | Deep learning | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.