2019
DOI: 10.1186/s40537-019-0248-6
|View full text |Cite
|
Sign up to set email alerts
|

Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

Abstract: Recently, we have seen lots of real-life examples of attacks' huge impacts in different domains such as politics and economics. Hacking has become more critical and more dangerous than ever before. The number of hacking attacks is growing exponentially every few months. That means signature-based IDS is not useful anymore as we cannot update it with new signatures every few minutes. Also with developing technologies attacks become more sophisticated, APT attacks are more common than ever before.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…We have done many experiments [26] that we care about collective and contextual attacks. Where we chose using a deep network with type of recurrent so we can handle sequences of actions or events.…”
Section: Methodsmentioning
confidence: 99%
“…We have done many experiments [26] that we care about collective and contextual attacks. Where we chose using a deep network with type of recurrent so we can handle sequences of actions or events.…”
Section: Methodsmentioning
confidence: 99%
“…This subsection studies the IDS schemes [82][83][84], which apply RNN to detect intrusions. For instance, for detecting attacks within the IoT network, Roy et al [85] presented a deep learning-based approach using an LSTM RNN.…”
Section: Recurrent Neural Network-based Schemesmentioning
confidence: 99%
“…In this paper [19] the language-processing concepts, distributed-deep-learning concepts, Big-data concepts, ow-analysis of anomaly-identi cation concepts and the contextual-analysis concepts are integrated to generate the model. Further to this, the framework de nes the network-abstract behaviour obtained by the millions count of packets in the context.…”
Section: Effective and Accurate Big-data Processing Based Operational Parametersmentioning
confidence: 99%