2021
DOI: 10.1186/s40537-021-00448-4
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection systems using long short-term memory (LSTM)

Abstract: An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. It scans a network or a system for a harmful activity or security breaching. IDS protects networks (Network-based intrusion detection system NIDS) or hosts (Host-based intrusion detection system HIDS), and work by either looking for signatures of known attacks or deviations from normal activity. Deep learning algorithms proved their effectiveness in intrusion detection co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(62 citation statements)
references
References 24 publications
(25 reference statements)
0
43
0
Order By: Relevance
“…IIoT routing attacks can be detected using Nayak et al The GRU is the most effective model for botnet detection; however, it is computationally costly, yet it can handle large amounts of data and identify sequences efficiently. Laghrissi et al [58] developed deep learning techniques for identifying attacks based on the LSTM algorithm. They employed PCA and Mutual information to reduce the data's dimensionality and choose the best features.…”
Section: Articlementioning
confidence: 99%
“…IIoT routing attacks can be detected using Nayak et al The GRU is the most effective model for botnet detection; however, it is computationally costly, yet it can handle large amounts of data and identify sequences efficiently. Laghrissi et al [58] developed deep learning techniques for identifying attacks based on the LSTM algorithm. They employed PCA and Mutual information to reduce the data's dimensionality and choose the best features.…”
Section: Articlementioning
confidence: 99%
“…This year, LSTM is being considered as a possible model for an IDS network, such as the so-called DL-IDS, which is currently under development. According to the results of an experiment on hybrid PCA/LSTM [30], the DL-IDS has an accuracy rate of 98.67%. PCA is in charge of reducing the size of raw data attacks, while LSTM is in charge of categorizing network attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Laghrissi et al 68 introduced intrusion detection systems for IoT devices based on neural networks and LSTM to detect anomalies. Also, some reduction algorithms were used to decrease the number of features, which helped faster detection with acceptable accuracy.…”
Section: Organization Of Iot Threat Detection Techniquesmentioning
confidence: 99%