2021 16th Asia Joint Conference on Information Security (AsiaJCIS) 2021
DOI: 10.1109/asiajcis53848.2021.00011
|View full text |Cite
|
Sign up to set email alerts
|

An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…These are the most recent datasets which provide characteristics of network attacks, which include new types of attacks [7]. Deep learning is already widely used to solve the detection problems of various network attacks [39][40][41]. In [42], the Deep Neural Network on NSL-KDD dataset was researched for effective attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…These are the most recent datasets which provide characteristics of network attacks, which include new types of attacks [7]. Deep learning is already widely used to solve the detection problems of various network attacks [39][40][41]. In [42], the Deep Neural Network on NSL-KDD dataset was researched for effective attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…[26] Development an establishment of ISMS [27] Awareness measures [28], [29], [30], [31], [32], [33] Lack of skilled workers in public sector and effects [34], [35] Physical Security and Security Assessment [36], [37], [38], [39], [40] Legal framework parameters in cybersecurity domain [41], [42] Maturity models [43], [44] Most papers deal with the safeguarding of the technical components or tackle the analysis of cyber-attacks and pos-sible preventive measures. It is striking that a large number of papers put the staff in the focus and examine how their awareness for cybersecurity can be increased.…”
Section: Thematic Areamentioning
confidence: 99%
“…Furthermore, deep learning-based anomaly detection systems are actively discussed [47]. However, in real-world SOCs, the potential of human security experts may be more trusted than the automated methods so that some SOCs utilize or develop practical machine learning-based anomaly detection solutions combined with information visualization [48,49], which is out of our scope.…”
Section: The Goals Of Network Traffic Analysis For Socsmentioning
confidence: 99%