Detailed Information

Cited 26 time in webofscience Cited 48 time in scopus
Metadata Downloads

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

Authors
Lee, Sang-WoongSidqi, Haval MohammedMohammadi, MokhtarRashidi, ShimaRahmani, Amir MasoudMasdari, MohammadHosseinzadeh, Mehdi, M.
Issue Date
1-Aug-2021
Publisher
ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
Keywords
Auto-encoder; CNN; Deep learning; DNN; GAN; Intrusion detection; LSTM
Citation
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.187
Journal Title
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume
187
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81477
DOI
10.1016/j.jnca.2021.103111
ISSN
1084-8045
Abstract
Providing a high-performance Intrusion Detection System (IDS) can be very effective in controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative impacts of the security attacks on computer systems and networks, various Artificial Intelligence (AI)-based techniques have been used to introduce versatile IDS approaches. Deep learning is a branch of AI techniques, mainly based on multi-layer artificial neural networks. Recently, deep learning techniques have gained momentum in the intrusion detection domain and several IDS approaches are provided in the literature using various deep neural networks to deal with privacy concerns and security threats. For this purpose, this article focuses on the deep IDS approaches and investigates how deep learning networks are employed by different approaches in different steps of the intrusion detection process to achieve better results. It classifies the studied IDS schemes regarding the deep learning networks utilized in them and describes their main contributions and capabilities. Besides, in each category, their main features such as evaluated metrics, datasets, simulators, and environments are compared. Also, a comparison of the deep IDS approaches main properties are provided to illuminate the main techniques applied in them as well as the area less focused in the literature. Finally, the concluding remarks in the deep IDS context are provided and possible directions at the subsequent studies are listed. © 2021 Elsevier Ltd
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 소프트웨어학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hosseinzadeh, Mehdi photo

Hosseinzadeh, Mehdi
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE