A Review of Deep Learning IDS for DDoS Attacks in WLANs

An Intrusion detection system (IDS) is a critical security organ which serves as a gatekeeper against the ever-evolving cyber space attacks. Among the recent technological advancement, high speed communication networks and Artificial Intelligence are notably the key driving factors for the evolution of such IDS from the rule-based to classic machine learning and recently, the deep learning using either manual feature engineering or representation learning techniques. This paper is a methodological literature review of various generations of machine learning-based IDS to assess their effectiveness. The review result is a pretext and blueprint for a new method that attempts to combine representation and manual feature learning techniques to effectively detect Distributed Denial of Service attacks (DDoS) in Wireless Local Area Networks (WLANs).

[1]  Ming Zhu,et al.  End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[2]  Rahul Sourav Singh,et al.  Denial of service attack in wireless data network: A survey , 2017, 2017 Devices for Integrated Circuit (DevIC).

[3]  Yang Yu,et al.  A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.

[4]  Giuseppe Aceto,et al.  Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges , 2019, IEEE Transactions on Network and Service Management.

[5]  Ling Gao,et al.  An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.

[6]  Igor Kotenko,et al.  Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning , 2018, IEEE Access.

[7]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[8]  Tauseef Jamal,et al.  Denial of Service Attack in Wireless LAN , 2018 .

[9]  Ming Zhu,et al.  Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).

[10]  Ali A. Ghorbani,et al.  Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.

[11]  Nahid Golafshani,et al.  Understanding Reliability and Validity in Qualitative Research , 2003 .

[12]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  S. Mann Research Methods for Business: A Skill-Building Approach , 2013 .

[14]  Raghavendra Chalapathy University of Sydney,et al.  Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.

[15]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[16]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[17]  J. K. Kalita,et al.  Botnet in DDoS Attacks: Trends and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[18]  Yiqiang Sheng,et al.  HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.

[19]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.