2019
DOI: 10.1007/s00521-019-04557-3
|View full text |Cite
|
Sign up to set email alerts
|

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(36 citation statements)
references
References 74 publications
0
31
0
2
Order By: Relevance
“…The researchers of [91] review deep learning for the detection of cyber security intrusion. In [92], the authors review deep learning-based intrusion detection systems. The authors of [93] conducted a study of cybersecurity deep learning methods.…”
Section: Cybersecurity Data and Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The researchers of [91] review deep learning for the detection of cyber security intrusion. In [92], the authors review deep learning-based intrusion detection systems. The authors of [93] conducted a study of cybersecurity deep learning methods.…”
Section: Cybersecurity Data and Systemsmentioning
confidence: 99%
“…The strongest aspect of deep learning techniques is effectively learning feature hierarchies based on the patterns in the data [92]. Several unsupervised techniques such as autoencoder (AE), deep belief network (DBN), restricted Boltzmann machines (RBMs), generative adversarial network (GAN) etc., can also be used in the domain of cybersecurity [90,92]. Hybrid techniques can also be used for significant outcomes in several cases [92].…”
Section: Machine Learning-based Modelingmentioning
confidence: 99%
“…The search strategy used in this work followed the method employed by Aleesa et al [52], as outlined in Figure 1. This includes the following four (4) stages:…”
Section: Review Research Methodsmentioning
confidence: 99%
“…An efficient way to detect network scanning attacks is the data mining of network traffic based on a neural network approach [14][15][16][17]. This approach is based on the creation of a neural network trained with the use of data that include the signs of a network scanning attack.…”
Section: Methodsmentioning
confidence: 99%