2020
DOI: 10.1016/j.jisa.2019.102419
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

Abstract: In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches. The dataset plays an important role in intrusion detection, therefore we describe 35 well-known cyber datasets and provide a classification of these datasets into seven categories; namely, network traffic-based dataset, electrical network-based dataset, internet traff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
246
2
4

Year Published

2020
2020
2023
2023

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 469 publications
(254 citation statements)
references
References 102 publications
2
246
2
4
Order By: Relevance
“…Both DeepCoin and DeliveryCoin frameworks demonstrated the efficiency of the deep learning techniques in cyber security intrusion detection. For more detail about the deep learning techniques in cyber security intrusion detection, we refer the reader to our recent studies in [26,27].…”
Section: Relevant Workmentioning
confidence: 99%
“…Both DeepCoin and DeliveryCoin frameworks demonstrated the efficiency of the deep learning techniques in cyber security intrusion detection. For more detail about the deep learning techniques in cyber security intrusion detection, we refer the reader to our recent studies in [26,27].…”
Section: Relevant Workmentioning
confidence: 99%
“…Moreover, when such datasets are available, permission to experimentally run attacks is not easily obtained, the process is costly, and there are complex security and privacy issues. Consequently, most of the work reported in the literature is based on artificially generated datasets [36], [45]. In this paper, we have the advantage of having access to a real dataset.…”
Section: Experimental Evaluation a Synthetic Replay Attack Datasetmentioning
confidence: 99%
“…In [51], the current deep learning approaches have been surveyed for intrusion detection. Because dataset play a major role in detecting intruders, 35 of the most popular cyber-datasets are utilized, which are classified into seven categories.…”
Section: The Role Of Artificial Intelligence In Sustainable Cybersecumentioning
confidence: 99%