4.6 Review

Deep Learning-Based Intrusion Detection Systems: A Systematic Review

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Stacked Autoencoder-Based Probabilistic Feature Extraction for On-Device Network Intrusion Detection

Thi-Nga Dao et al.

Summary: This paper proposes a lightweight yet effective network intrusion detection system (NIDS) scheme that utilizes stacked autoencoders and network pruning technique to identify network attacks in resource-constrained edge devices. Experimental results show that the proposed scheme outperforms existing NIDSs in terms of attack detection rate, while significantly reducing computational complexity.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Artificial Intelligence

Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment

M. Mayuranathan et al.

Summary: An efficient feature subset selection based classification model is introduced for the identification of DDoS attack, utilizing Random Harmony Search (RHS) optimization model for feature selection and a Deep learning based classifier model for detection, resulting in improved detection accuracy.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Review Computer Science, Artificial Intelligence

Towards fuzzy anomaly detection-based security: a comprehensive review

Mohammad Masdari et al.

Summary: This paper focuses on anomaly detection systems (ADSs) that utilize fuzzy logic in combination with other machine learning and data mining techniques. It categorizes different fuzzy ADS approaches based on their utilized fuzzy algorithm, summarizes their major contributions, and highlights both their advantages and limitations. Future research directions in the fuzzy ADS context are also discussed.

FUZZY OPTIMIZATION AND DECISION MAKING (2021)

Article Computer Science, Information Systems

A novel scalable intrusion detection system based on deep learning

Soosan Naderi Mighan et al.

Summary: This paper successfully addresses the challenge of processing a vast amount of security related data for network intrusion detection by combining Apache Spark, deep networks, and machine learning methods. The proposed method utilizes stacked autoencoder network for feature extraction and various classification-based intrusion detection methods for efficient detection in massive network traffic data. The performance is evaluated using real time UNB ISCX 2012 dataset in terms of accuracy, f-measure, sensitivity, precision, and time.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Article Computer Science, Hardware & Architecture

Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks

Chia-Ming Hsu et al.

Summary: This study proposes a deep learning model based on the CNN-LSTM for IDS to classify traffic networks, which outperforms other existing works according to the experiments on the NSL-KDD dataset.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Computer Science, Information Systems

A survey and classification of the security anomaly detection mechanisms in software defined networks

Tohid Jafarian et al.

Summary: Software defined network (SDN) decouples the network control and data planes, making it vulnerable to various security attacks. Anomalies and intrusions can have significant impacts on important domains, making anomaly detection a broad research field.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification

Tohid Jafarian et al.

Summary: The paper proposes a novel multi-stage modular approach for detecting and mitigating security anomalies in the SDN environment. Experimental results demonstrate that the proposed method outperforms other methods in terms of improving accuracy and detection rate, and reducing classification error and false alarm rate.

COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Nearest cluster-based intrusion detection through convolutional neural networks

Giuseppina Andresini et al.

Summary: The paper introduces a novel deep learning methodology using convolutional neural networks for network intrusion detection, where network flows are represented as 2D images to analyze potential data patterns and achieve better predictive accuracy compared to competitive architectures.

KNOWLEDGE-BASED SYSTEMS (2021)

Review Computer Science, Theory & Methods

Deep Learning for Anomaly Detection: A Review

Guansong Pang et al.

Summary: Deep anomaly detection has emerged as a critical direction in the research field of anomaly detection, covering advancements in multiple categories of methods. Reviewing them can help us understand their advantages, disadvantages, and how they address challenges.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Artificial Intelligence

An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment

Reddy SaiSindhuTheja et al.

Summary: This paper proposes an efficient DoS attack detection system using the Oppositional Crow Search Algorithm, which outperforms other conventional methods in terms of Precision, Recall, F-Measure, and Accuracy by significant margins. The experimental results demonstrate the effectiveness of the proposed technique in separating standard data and removing compromised data.

APPLIED SOFT COMPUTING (2021)

Article Computer Science, Hardware & Architecture

PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection

Lian Yu et al.

Summary: This paper proposes a hierarchical packet byte-based CNN model to improve the reliability of network intrusion detection through feature extraction and few shot learning, achieving superior results in experiments. The hierarchical structure of network traffic plays a crucial role in this process.

COMPUTER NETWORKS (2021)

Article Computer Science, Hardware & Architecture

Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model

Soumyadeep Thakur et al.

Summary: This paper proposes a model that extracts useful features from given features and uses a deep learning algorithm to classify intrusions. Specific domains and generic network intrusions typically require different features for classification. The proposed method achieves new benchmark results on the CICIDS2017 dataset.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Computer Science, Information Systems

Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder

Xing Xu et al.

Summary: Intrusion detection is important for network security, but traditional machine learning-based methods face challenges with unknown attacks. This article introduces a novel deep learning method LCVAE for intrusion detection, which effectively handles imbalanced intrusion data. Experimental results demonstrate the superior performance of LCVAE in detecting intrusions and its potential for generating diverse new intrusion data.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Chemical

HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System

Muhammad Ashfaq Khan

Summary: Network attacks are a crucial problem in modern society, and developing effective intrusion detection systems is essential to mitigate the impact of malicious threats. Utilizing deep learning and machine learning techniques, researchers have designed a hybrid convolutional recurrent neural network intrusion detection system that achieves high accuracy in detecting malicious cyberattacks.

PROCESSES (2021)

Article Computer Science, Hardware & Architecture

Stacked recurrent neural network for botnet detection in smart homes

Segun Popoola et al.

Summary: This paper investigates the vulnerability of IoT devices in Smart Home Networks to complex botnet attacks and examines the effectiveness of Stacked Recurrent Neural Network (SRNN) in classifying highly imbalanced network traffic data. The results show that SRNN outperforms RNN in all classification scenarios, offering better representation of discriminating features in highly imbalanced network traffic samples and demonstrating stronger capabilities in handling overfitting issues and generalization ability.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Automation & Control Systems

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems

Beibei Li et al.

Summary: The study introduces a novel federated deep learning scheme named DeepFed for detecting cyber threats against industrial CPSs. By designing a new intrusion detection model and federated learning framework, the research successfully achieves secure detection of various cyber threats.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network

Xiu Kan et al.

Summary: In this paper, a novel IoT network intrusion detection approach based on APSO-CNN is proposed, which optimizes CNN structure parameters using PSO algorithm and introduces a new evaluation method to compare with other algorithms. Experimental results validate the effectiveness and reliability of the proposed method.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

An Efficient Intrusion Detection Method Based on Dynamic Autoencoder

Ruijie Zhao et al.

Summary: The rapid growth of wireless sensor networks and applications has led to an increase in unsolicited intrusions and security threats, disrupting normal operations. Deep learning-based network intrusion detection methods have been widely studied, but their high computational complexity hinders deployment in devices with limited processing power. This letter introduces a lightweight dynamic autoencoder network (LDAN) for NID, which efficiently extracts features through a lightweight structure design. Experimental results demonstrate that the proposed model achieves high accuracy and robustness while significantly reducing computational cost and model size.

IEEE WIRELESS COMMUNICATIONS LETTERS (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Robust Detection of Network Intrusion using Tree-based Convolutional Neural Networks

Sanket Mishra et al.

Summary: Automated Intrusion Detection Systems (IDS) serve as the first line of defense in monitoring and identifying suspicious network activities. The emergence of sophisticated network attacks has made intrusion detection more complicated, prompting the use of deep learning approaches like TreeNets to effectively isolate such attacks through efficient identification of non-linear relationships in the data.

CODS-COMAD 2021: PROCEEDINGS OF THE 3RD ACM INDIA JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA (8TH ACM IKDD CODS & 26TH COMAD) (2021)

Article Computer Science, Information Systems

Intrusion Detection System Based on Fast Hierarchical Deep Convolutional Neural Network

Robson V. Mendonca et al.

Summary: With the increasing number of connected devices, the search for network vulnerabilities has become easier for attackers, leading to a higher demand for protection systems in companies. Through security attacks, identifying characteristics of the attacks is possible, emphasizing the need for fast and effective security identification models. Experimental results show that the proposed hierarchical model based on Tree-CNN outperforms other IDS based on machine learning algorithms in terms of low complexity, reduced processing time, and improved detection accuracy.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN

Chuan Yue et al.

Summary: A novel ensemble intrusion detection method is proposed to defense network attacks against the train Ethernet Consist Network (ECN), achieving a superior detection performance with an accuracy of 0.975 based on experimental results.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks

Weimin Wen et al.

Summary: The study introduces an intrusion detection model based on convolutional deep belief networks, which effectively addresses issues of redundancy and energy consumption in intrusion detection. By utilizing unsupervised learning for feature extraction, the model enhances intrusion detection accuracy and reduces false alarm rates.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Intrusion detection using deep sparse auto-encoder and self-taught learning

Aqsa Saeed Qureshi et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks

Sanmeet Kaur et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Arwa Aldweesh et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Interdisciplinary Applications

Deep recurrent neural network for IoT intrusion detection system

Muder Almiani et al.

SIMULATION MODELLING PRACTICE AND THEORY (2020)

Article Computer Science, Information Systems

A survey and classification of the workload forecasting methods in cloud computing

Mohammad Masdari et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

A hybrid deep learning model for efficient intrusion detection in big data environment

Mohammad Mehedi Hassan et al.

INFORMATION SCIENCES (2020)

Article Engineering, Multidisciplinary

Robust detection for network intrusion of industrial IoT based on multi-CNN fusion

Yanmiao Li et al.

MEASUREMENT (2020)

Article Computer Science, Artificial Intelligence

An intrusion detection approach based on improved deep belief network

Qiuting Tian et al.

APPLIED INTELLIGENCE (2020)

Article Computer Science, Information Systems

A deep learning method with wrapper based feature extraction for wireless intrusion detection system

Sydney Mambwe Kasongo et al.

COMPUTERS & SECURITY (2020)

Article Telecommunications

In-vehicle network intrusion detection using deep convolutional neural network

Hyun Min Song et al.

VEHICULAR COMMUNICATIONS (2020)

Article Computer Science, Artificial Intelligence

A deep learning approach for effective intrusion detection in wireless networks using CNN

B. Riyaz et al.

SOFT COMPUTING (2020)

Article Computer Science, Hardware & Architecture

A survey on intrusion detection and prevention in wireless ad-hoc networks

Khalid Khan et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2020)

Review Computer Science, Artificial Intelligence

A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems

Mohammad Masdari et al.

APPLIED SOFT COMPUTING (2020)

Article Engineering, Electrical & Electronic

Security anomaly detection in software-defined networking based on a prediction technique

Tohid Jafarian et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Computer Science, Information Systems

Packet Preprocessing in CNN-Based Network Intrusion Detection System

Wooyeon Jo et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

A Mean Convolutional Layer for Intrusion Detection System

Leila Mohammadpour et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Theory & Methods

Genetic convolutional neural network for intrusion detection systems

Minh Tuan Nguyen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Proceedings Paper Computer Science, Software Engineering

Intrusion Detection Model of CNN-BiLSTM Algorithm Based on Mean Control

Liangkang Zhang et al.

PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020) (2020)

Article Computer Science, Hardware & Architecture

DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks

M. Premkumar et al.

MICROPROCESSORS AND MICROSYSTEMS (2020)

Article Computer Science, Theory & Methods

A comprehensive survey of anomaly detection techniques for high dimensional big data

Srikanth Thudumu et al.

JOURNAL OF BIG DATA (2020)

Article Computer Science, Information Systems

A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems

Hanan Hindy et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System

Sydney Mambwe Kasongo et al.

ICT EXPRESS (2020)

Article Multidisciplinary Sciences

A deep learning-based multi-agent system for intrusion detection

Faten Louati et al.

SN APPLIED SCIENCES (2020)

Article Computer Science, Artificial Intelligence

Application of Deep Learning Technique in an Intrusion Detection System

Shideh Saraeian et al.

INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security

Feng Jiang et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2020)

Article Computer Science, Information Systems

AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection

Aechan Kim et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

A deep learning approach for proactive multi-cloud cooperative intrusion detection system

Adel Abusitta et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Chemistry, Analytical

Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things

Geethapriya Thamilarasu et al.

SENSORS (2019)

Article Computer Science, Hardware & Architecture

Intrusion detection in smart cities using Restricted Boltzmann Machines

Asmaa Elsaeidy et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Dynamic Deep Forest: An Ensemble Classification Method for Network Intrusion Detection

Bo Hu et al.

ELECTRONICS (2019)

Article Computer Science, Hardware & Architecture

Designing online network intrusion detection using deep auto-encoder Q-learning

Chayoung Kim et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Review Chemistry, Multidisciplinary

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

Hongyu Liu et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Information Systems

Intrusion detection system using deep learning for in-vehicle security

Jiayan Zhang et al.

AD HOC NETWORKS (2019)

Article Computer Science, Theory & Methods

Deep Learning Based Recommender System: A Survey and New Perspectives

Shuai Zhang et al.

ACM COMPUTING SURVEYS (2019)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection Systems with Deep Learning: A Systematic Mapping Study

Sinem Osken et al.

2019 SCIENTIFIC MEETING ON ELECTRICAL-ELECTRONICS & BIOMEDICAL ENGINEERING AND COMPUTER SCIENCE (EBBT) (2019)

Article Computer Science, Information Systems

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems

Dimitrios Papamartzivanos et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection Using Big Data and Deep Learning Techniques

Osama Faker et al.

PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection in IoT Systems Based on Deep Learning Using Convolutional Neural Network

Pham Van Huong et al.

PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS) (2019)

Article Computer Science, Theory & Methods

Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

Khloud Al Jallad et al.

JOURNAL OF BIG DATA (2019)

Proceedings Paper Computer Science, Artificial Intelligence

DeepVCM: a Deep Learning Based Intrusion Detection Method in VANET

Yi Zeng et al.

2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Performance Enhancement of Deep Neural Network Using Feature Selection and Preprocessing for Intrusion Detection

Ju-ho Woo et al.

2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset

Chongzhen Zhang et al.

PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019) (2019)

Article Computer Science, Information Systems

Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey

Yingnan Sun et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks

Yihan Xiao et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Deep Learning Approach for Intelligent Intrusion Detection System

R. Vinayakumar et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning

Joshua Bassey et al.

2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC) (2019)

Article Computer Science, Information Systems

A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection

Farrukh Aslam Khan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System

Sydney Mambwe Kasongo et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

Evaluating Deep Learning Based Network Intrusion Detection System in Adversarial Environment

Ye Peng et al.

PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019) (2019)

Article Computer Science, Interdisciplinary Applications

A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs

R. Vinayakumar et al.

INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (2019)

Article Computer Science, Information Systems

Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network

Ying Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Combined Wireless Network Intrusion Detection Model Based on Deep Learning

Hongyu Yang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Theory & Methods

A prediction system of Sybil attack in social network using deep-regression model

Muhammad Al-Qurishi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Abebe Abeshu Diro et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Artificial Intelligence

A survey on deep learning for big data

Qingchen Zhang et al.

INFORMATION FUSION (2018)

Review Computer Science, Artificial Intelligence

Deep learning for sentiment analysis: A survey

Lei Zhang et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2018)

Article Computer Science, Information Systems

Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning

George Loukas et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Deep Learning-Based Intrusion Detection with Adversaries

Zheng Wang

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks

Kehe Wu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection

Majjed Al-Qatf et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units

Congyuan Xu et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

A Deep Learning Approach to Network Intrusion Detection

Nathan Shone et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)

Article Computer Science, Artificial Intelligence

Improved traffic detection with support vector machine based on restricted Boltzmann machine

Jun Yang et al.

SOFT COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Markov chain-based evaluation of the certificate status validations in hybrid MANETs

Mohammad Masdari

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Review Computer Science, Hardware & Architecture

A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems

Mohammad Masdari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Review Computer Science, Hardware & Architecture

Key management in wireless Body Area Network: Challenges and issues

Mohammad Masdari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

A survey on deep learning in medical image analysis

Geert Litjens et al.

MEDICAL IMAGE ANALYSIS (2017)

Review Computer Science, Information Systems

Advanced internet of things for personalised healthcare systems: A survey

Jun Qi et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection

Arnaldo Gouveia et al.

ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2017, PT I (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Session-Based Network Intrusion Detection Using a Deep Learning Architecture

Yang Yu et al.

MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE (MDAI 2017) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

A Hybrid System of Deep Learning and Learning Classifier System for Database Intrusion Detection

Seok-Jun Bu et al.

HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2017 (2017)

Proceedings Paper Computer Science, Artificial Intelligence

DeepDefense: Identifying DDoS Attack via Deep Learning

Xiaoyong Yuan et al.

2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP) (2017)

Article Computer Science, Hardware & Architecture

Host-based intrusion detection system for secure human-centric computing

Daesung Moon et al.

JOURNAL OF SUPERCOMPUTING (2016)

Article Computer Science, Hardware & Architecture

Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN

N. Pandeeswari et al.

MOBILE NETWORKS & APPLICATIONS (2016)

Review Computer Science, Hardware & Architecture

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Salman Iqbal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Neural networks: An overview of early research, current frameworks and new challenges

Alberto Prieto et al.

NEUROCOMPUTING (2016)

Review Computer Science, Information Systems

A survey and taxonomy of DoS attacks in cloud computing

Mohammad Masdari et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Review Computer Science, Information Systems

Comprehensive analysis of the authentication methods in wireless body area networks

Mohammad Masdari et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Theory & Methods

Taxonomy and Survey of Collaborative Intrusion Detection

Emmanouil Vasilomanolakis et al.

ACM COMPUTING SURVEYS (2015)

Article Computer Science, Information Systems

Towards efficient certificate status validations with E-ADOPT in mobile ad hoc networks

Mohammad Masdari et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Theory & Methods

A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

Robert Mitchell et al.

ACM COMPUTING SURVEYS (2014)

Review Computer Science, Information Systems

False alarm minimization techniques in signature-based intrusion detection systems: A survey

Neminath Hubballi et al.

COMPUTER COMMUNICATIONS (2014)

Article Computer Science, Information Systems

A Survey of Intrusion Detection Systems in Wireless Sensor Networks

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

A survey of wireless technologies coexistence in WBAN: analysis and open research issues

Thaier Hayajneh et al.

WIRELESS NETWORKS (2014)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Review Computer Science, Hardware & Architecture

An intrusion detection and prevention system in cloud computing: A systematic review

Ahmed Patel et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Review Computer Science, Hardware & Architecture

Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks

Mohammad Masdari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Review Engineering, Electrical & Electronic

A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

Mohammad Masdari et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2011)

Article Computer Science, Information Systems

A survey of coordinated attacks and collaborative intrusion detection

Chenfeng Vincent Zhou et al.

COMPUTERS & SECURITY (2010)