2019
DOI: 10.5815/ijcnis.2019.03.02
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset

Abstract: The network infrastructure of any organization is always under constant threat to a variety of attacks; namely, break-ins, security breach or system misuse. The Network Intrusion Detection System (NIDS) employed in a network detects such penetration attacks and intrusions within a network. Known classes of attacks can be detected easily by performing pattern matching while the unknown attacks are harder to detect. An attempt has been made to design a system using a deep learning approach for intrusion detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
32
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(37 citation statements)
references
References 6 publications
0
32
0
Order By: Relevance
“…This Deep learning methodology deals with several architectures like Deep Neural Networks, Convolution neural networks, Recurrent Neural Networks etc. Based on the depth or number of layers involved in the network generally tends to yield high accuracy when compared to less number of layers [12]. The working of these structures is as follows: Input layer takes the set of features and the output layer yields the specific set of features that are meant to be there in the targeted output.…”
Section: Related Workmentioning
confidence: 99%
“…This Deep learning methodology deals with several architectures like Deep Neural Networks, Convolution neural networks, Recurrent Neural Networks etc. Based on the depth or number of layers involved in the network generally tends to yield high accuracy when compared to less number of layers [12]. The working of these structures is as follows: Input layer takes the set of features and the output layer yields the specific set of features that are meant to be there in the targeted output.…”
Section: Related Workmentioning
confidence: 99%
“…Proceedings of 35th International Conference on Computers and Their Applications is of high importance to develop effective precautionary measures to safeguard users from attacks to which they are susceptible [2,35]. System designs which are used to detect malicious actions in a network are called Network Intrusion Detection Systems or NIDS [3,2]. The two main types are the Signature-based Network Intrusion Detection Systems or SNIDS and Anomaly Detection based Network Intrusion Detection Systems or ADNIDS.…”
Section: Epic Series In Computingmentioning
confidence: 99%
“…SNIDS are aimed at detecting an unauthorized access or intrusion by matching patterns on the features for which it is trained. An ADNIDS type of system detects an anomaly when there is a deviation in the normal traffic pattern [2]. Since an ADNIDS is highly prone to false alarms, SNIDS are regarded as a preferred approach for Detecting Network Intrusions.…”
Section: Epic Series In Computingmentioning
confidence: 99%
See 2 more Smart Citations