2022
DOI: 10.3390/informatics9010029
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection

Abstract: Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilities exploits. Behaviour-based network IDSs have been seen as a way to overcome signature-based IDS flaws, namely through the implementation of machine-learning-based methods, to tolerate new forms of normal network behaviour, and to identify yet unknown malicio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
16
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 30 publications
1
16
1
Order By: Relevance
“…This is due to the high similarity of attack and benign patterns for this particular data file. In fact, even in this extreme case the results obtained with the nearest neighbor algorithm are comparable to the results reported using deep learning [20] (Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)), as shown in Table 3. The CNN and LSTM results show a better accuracy and precision, however the nearest neighbor method provides a much better F-measure and recall, showing that it deals better with such an unbalaced data set.…”
Section: Numerical Resultssupporting
confidence: 76%
See 3 more Smart Citations
“…This is due to the high similarity of attack and benign patterns for this particular data file. In fact, even in this extreme case the results obtained with the nearest neighbor algorithm are comparable to the results reported using deep learning [20] (Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)), as shown in Table 3. The CNN and LSTM results show a better accuracy and precision, however the nearest neighbor method provides a much better F-measure and recall, showing that it deals better with such an unbalaced data set.…”
Section: Numerical Resultssupporting
confidence: 76%
“…for such a simple method. However, the results obtained with the other more complex methods, including deep learning neural networks also show a bad performance in the case of 03-01-2018.csv [1]- [20], with comparable values. This is due to the high similarity of attack and benign patterns for this particular data file.…”
Section: Numerical Resultsmentioning
confidence: 84%
See 2 more Smart Citations
“…As a result, the present focus of this thesis is to create a network-based IDS that can identify attacks in a big, high-speed, high-volume venture network. Research by Antunes et al [37] offer a scenario in which an attacker attacks a specific system without authorization while avoiding harming other networks with the necessity to look for, and send hidden and sensitive data. Experts can carry out such an assault to conceal the entire attack and avoid detection.…”
Section: Referencementioning
confidence: 99%