A survey of network intrusion detection systems based deep learning approaches
Annotation
Currently, most IT organizations are inclined towards a cloud computing environment because of its distributed and scalable nature. However, its flexible and open architecture is receiving lots of attention from potential intruders for cyber threats. Here, Intrusion Detection System (IDS) plays a significant role in monitoring malicious activities in cloud-based systems. The state of the art of this paper is to systematically review the existing methods for detecting intrusions based upon various techniques, such as data mining, machine learning, and deep learning methods. Recently, deep learning techniques have gained momentum in the intrusion detection domain, and several IDS approaches are provided in the literature using various deep learning techniques to deal with privacy concerns and security threats. For this purpose, the article focuses on the deep IDS approaches and investigates how deep learning networks are employed by different approaches in various steps of the intrusion detection process to achieve better results. Then, it provided a comparison of the deep learning approaches and the shallow machine learning methods. Also, it describes datasets that are most used in IDS.
Keywords
Постоянный URL
Articles in current issue
- Polymer composition with phenanthrenequinone for recording relief holographic gratings
- Modern approaches to the application of mathematical modeling methods in biomedical research
- Analysis of the phase images obtained during the collection of a holographic registration system based on the geometric phase effect and a polarization camera
- Color triangle color separation system for colorimetric research in microscopy
- The concept of aerial photography using a two-element active optoelectronic complex
- Variational problem of adaptive optimal control. Theoretical and applied computer analysis
- Brief review of the development of theories of robustness, roughness and bifurcations of dynamic systems
- Multiple context-free path querying by matrix multiplication
- Predicting the results of the 16-factor R. Cattell test based on the analysis of text posts of social network users
- Methodology for the control of electric power distribution system components to ensure the quality of consumed electricity
- Voice based answer evaluation system for physically disabled students using natural language processing and machine learning
- Natural language based malicious domain detection using machine learning and deep learning
- Hybrid JAYA algorithm for workflow scheduling in cloud
- Information model of the essential goods purchase duration
- Analysis and control of user engagement in personalized mobile assisting software for chronic disease patients
- Role discovery in node-attributed public transportation networks: the model description
- Monitoring the health status of the population by age groups
- An intelligent shell game optimization based energy consumption analytics model for smart metering data
- Active voltage damping method with negative DC link current feedback in electric and hybrid electric transmissions
- Comparative analysis of switched reluctance motor control algorithms
- Gas dynamics of stationary supersonic gas jets with inert particles exhausting into a medium with low pressure
- Mixed forms of free oscillations of a rectangular CFCF-plate
- Modeling of heat-hydrodynamic processes in evaporators of low-temperature systems with intrachannel boiling of refrigerants
- High performance modeling of the stress-strain state of thin-walled shell structures with the use of deep learning
- Validation of state machine specifications