2021
DOI: 10.3390/s21134294
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Autoencoders for Network Intrusion Detection

Abstract: As network attacks are constantly and dramatically evolving, demonstrating new patterns, intelligent Network Intrusion Detection Systems (NIDS), using deep-learning techniques, have been actively studied to tackle these problems. Recently, various autoencoders have been used for NIDS in order to accurately and promptly detect unknown types of attacks (i.e., zero-day attacks) and also alleviate the burden of the laborious labeling task. Although the autoencoders are effective in detecting unknown types of attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 80 publications
(39 citation statements)
references
References 43 publications
(62 reference statements)
0
23
0
1
Order By: Relevance
“…Next, Song et al. [ 60 ] used autoencoders to develop an IDS method. The proposed method used three benchmark datasets, including NSL-KDD, IoTID20, and N-BaIoT.…”
Section: Related Workmentioning
confidence: 99%
“…Next, Song et al. [ 60 ] used autoencoders to develop an IDS method. The proposed method used three benchmark datasets, including NSL-KDD, IoTID20, and N-BaIoT.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Hassan et al [23] optimized hyper-parameters of sparse AE to extract better feature embedding for classifying intrusion attacks. Similarly, Song et al [24] proposed an Autoencoder model (trained on normal samples) based on the principle that the reconstruction loss of normal traffic samples is lower than that of abnormal (attack) samples so that a threshold can be set for detecting future attacks. In addition, this work evaluates various hyperparameters, model architectures, and latent size settings in terms of attack detection performance.…”
Section: Related Workmentioning
confidence: 99%
“…The technological advancements in present-day cyberattacks has made the activities of advanced attackers more complex to detect as a result of emerging obfuscation techniques [27], [38], [39] and interactions [40] with stealth variations carried out on IoT ecosystems.…”
Section: The Need To Convert Iot Malware Binaries To Imagesmentioning
confidence: 99%
“…In modern times, the emerging polymorphic malware attacks in the IoT ecosystems have been a major concern [1] due to complex obfuscation code structures that are mostly time based [41], [42]. These IoT malware signatures attacks that are predominantly multivariate [39], [40], [42]- [44] are updated sequentially on a minute-by-minute or hour-by-hour basis et al by the attackers, thereby inundating and silencing any potential alert system, which may cause massive vulnerabilities for exploitations in an IoT ecosystem. The current widespread detection and mitigation mechanisms for these emerging polymorphic IoT malware attacks that are largely obfuscated intricately can be problematic and resource intensive to both the traditional and automated malware detection solutions such as the signature based (e.g., large database), and automated based techniques (insufficient information) etc., adopted by major cybersecurity vendors, practitioners, and researchers in the cross-discipline cybersecurity industries.…”
Section: The Need To Convert Iot Malware Binaries To Imagesmentioning
confidence: 99%