2019
DOI: 10.1109/access.2019.2893871
|View full text |Cite
|
Sign up to set email alerts
|

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems

Abstract: The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high attack detection rates (ADR) while keeping false alarm rates under acceptable levels. However, the misuse IDSs suffer from the lack of agility, as they are unqualified to adapt to new and ''unknown'' environments. That is, such an IDS puts the security administrator into an intensive engineering task for keeping the IDS up-to-date every ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
73
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 135 publications
(74 citation statements)
references
References 28 publications
(48 reference statements)
0
73
0
1
Order By: Relevance
“…Meanwhile, Yin et al used LSTMs [22] as the deep learning approach for intrusion detection. Papamartzivanos et al used a self-taught learning method to deliver a self-adaptive IDS [42]. Furthermore, Yang et al proposed a new intrusion detection model that combined an improved conditional variational AutoEncoder (ICVAE) with a DNN [24] to enhance detection rates.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, Yin et al used LSTMs [22] as the deep learning approach for intrusion detection. Papamartzivanos et al used a self-taught learning method to deliver a self-adaptive IDS [42]. Furthermore, Yang et al proposed a new intrusion detection model that combined an improved conditional variational AutoEncoder (ICVAE) with a DNN [24] to enhance detection rates.…”
Section: Related Workmentioning
confidence: 99%
“…The processing layer, often referred to as the hidden layer, may contain one or more layers-a basic implementation of neural network is the Multilayer Perceptron (MLP) [18]. DL is an advancement on the MLP [19], but with more sophisticated and densely connected neurons that are capable of representing and extracting data in a more advanced form from data and mapping it into the output [20,21]. The neural network implementations that are used for DL include but not limited to Convolutional Neural Network, RNN and Long Short-Term Memory (LSTM).…”
Section: A Datasetmentioning
confidence: 99%
“…It can be observed that the processing speed of CNN and RNN are 4.2 ms and 2.8 ms for a single sample. In [523], a DL based adaptive and scalable misuse IDS is proposed. The MAPE-K reference model and STL model are used to learn from reconstructed data and to create a self adaptive misuse IDS.…”
Section: A Deep Learning In Intrusion Detectionmentioning
confidence: 99%