scispace - formally typeset
Open AccessJournal ArticleDOI

Network Intrusion Detection System: A systematic study of Machine Learning and Deep Learning approaches

Reads0
Chats0
TLDR
The concept of IDS is clarified and the taxonomy based on the notable ML and DL techniques adopted in designing network‐based IDS (NIDS) systems is provided, which highlights various research challenges and provided the future scope for the research in improving ML andDL‐based NIDS.
Abstract
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being gener...

read more

Citations
More filters
Journal ArticleDOI

Machine learning approaches to IoT security: A systematic literature review

TL;DR: This extensive literature survey on the most recent publications in IoT security identified a few key research trends that will drive future research in this field.
Journal ArticleDOI

HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System

TL;DR: A convolutional recurrent neural network (CRNN) is used to create a DL-based hybrid ID framework that predicts and classifies malicious cyberattacks in the network, and the proposed HCRNNIDS substantially outperforms current ID methodologies.
Journal ArticleDOI

Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset

TL;DR: In this article, a 5-layer autoencoder-based model was proposed for network anomaly detection tasks based on the results obtained through an extensive and rigorous investigation of several performance indicators involved in an AE model.
Journal ArticleDOI

Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things

TL;DR: A Local-Global best Bat Algorithm for Neural Networks (LGBA-NN) to select both feature subsets and hyperparameters for efficient detection of botnet attacks, inferred from 9 commercial IoT devices infected by two botnets: Gafgyt and Mirai.
Journal ArticleDOI

Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications

TL;DR: In this paper, an accurate system to identify malicious attacks on the Internet of Things environment has become verifiable, which is used to detect cyber-attacks on IoT devices and to identify the malicious attacks.
References
More filters
Journal ArticleDOI

Long short-term memory

TL;DR: A novel, efficient, gradient based method called long short-term memory (LSTM) is introduced, which can learn to bridge minimal time lags in excess of 1000 discrete-time steps by enforcing constant error flow through constant error carousels within special units.
Journal ArticleDOI

SMOTE: synthetic minority over-sampling technique

TL;DR: In this article, a method of over-sampling the minority class involves creating synthetic minority class examples, which is evaluated using the area under the Receiver Operating Characteristic curve (AUC) and the ROC convex hull strategy.
Journal ArticleDOI

A fast learning algorithm for deep belief nets

TL;DR: A fast, greedy algorithm is derived that can learn deep, directed belief networks one layer at a time, provided the top two layers form an undirected associative memory.
Journal ArticleDOI

SMOTE: Synthetic Minority Over-sampling Technique

TL;DR: In this article, a method of over-sampling the minority class involves creating synthetic minority class examples, which is evaluated using the area under the Receiver Operating Characteristic curve (AUC) and the ROC convex hull strategy.
Journal ArticleDOI

Extreme learning machine: Theory and applications

TL;DR: A new learning algorithm called ELM is proposed for feedforward neural networks (SLFNs) which randomly chooses hidden nodes and analytically determines the output weights of SLFNs which tends to provide good generalization performance at extremely fast learning speed.
Related Papers (5)