Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
暂无分享,去创建一个
[1] Zhi Xue,et al. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection , 2018, PAKDD.
[2] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[3] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[4] Angelo Gaeta,et al. Resilience Analysis of Critical Infrastructures: A Cognitive Approach Based on Granular Computing , 2019, IEEE Transactions on Cybernetics.
[5] Yuval Elovici,et al. Improving the effectiveness of intrusion detection systems for hierarchical data , 2019, Knowl. Based Syst..
[6] Chongsheng Zhang,et al. An empirical comparison on state-of-the-art multi-class imbalance learning algorithms and a new diversified ensemble learning scheme , 2018, Knowl. Based Syst..
[7] Fan Zhang,et al. An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units , 2018, IEEE Access.
[8] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[9] Pedro Casas,et al. RawPower: Deep Learning based Anomaly Detection from Raw Network Traffic Measurements , 2018, SIGCOMM Posters and Demos.
[10] Suleyman Serdar Kozat,et al. Efficient Online Learning Algorithms Based on LSTM Neural Networks , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[11] Jinoh Kim,et al. An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[12] David Brosset,et al. A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets , 2018, ArXiv.
[13] Feng Jiang,et al. An Intelligent Network Attack Detection Method Based on RNN , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[14] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[15] Jagath Samarabandu,et al. Comparison of Recurrent Neural Network Algorithms for Intrusion Detection Based on Predicting Packet Sequences , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).
[16] Jie Li,et al. Network Intrusion Detection Based on Stacked Sparse Autoencoder and Binary Tree Ensemble Method , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[17] Shie-Jue Lee,et al. Network intrusion detection using equality constrained-optimization-based extreme learning machines , 2018, Knowl. Based Syst..
[18] Wei Yu,et al. A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.
[19] Ping Wang,et al. Using convolutional neural networks to network intrusion detection for cyber threats , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).
[20] Furkan Yusuf Yavuz,et al. Deep learning in cyber security for internet of things , 2018 .
[21] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[22] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[23] Mohammad Teshnehlab,et al. An anomaly detection method to detect web attacks using Stacked Auto-Encoder , 2018, 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).
[24] Fahimeh Farahnakian,et al. A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[25] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[26] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[27] Abien Fred Agarap. A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.
[28] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[29] Brian Lee,et al. Comparative Study of Deep Learning Models for Network Intrusion Detection , 2018 .
[30] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[31] Yasir Hamid,et al. Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms , 2017, Journal of Communications and Information Networks.
[32] Qi Shi,et al. Deep learning combined with de-noising data for network intrusion detection , 2017, 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES).
[33] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[34] Jiang Li,et al. A few-shot deep learning approach for improved intrusion detection , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[35] Arafat Awajan,et al. Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).
[36] Kwangjo Kim,et al. Deep learning in intrusion detection perspective: Overview and further challenges , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).
[37] Kwangjo Kim,et al. Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning , 2017, WISA.
[38] Ming Zhu,et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[39] Le Thanh Sach,et al. An anomaly-based network intrusion detection system using Deep learning , 2017, 2017 International Conference on System Science and Engineering (ICSSE).
[40] Lijuan Zheng,et al. Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[41] Md Zahangir Alom,et al. Network intrusion detection for cyber security using unsupervised deep learning approaches , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).
[42] Mahmood Yousefi-Azar,et al. Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[43] Xueqin Zhang,et al. Deep learning based intelligent intrusion detection , 2017, 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN).
[44] Ali A. Ghorbani,et al. Towards a Reliable Intrusion Detection Benchmark Dataset , 2017 .
[45] Yang Yu,et al. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders , 2017, Secur. Commun. Networks.
[46] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[47] 김광조,et al. Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning , 2016 .
[48] Carla Purdy,et al. Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[49] Nhien-An Le-Khac,et al. Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.
[50] Yunheung Paek,et al. LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems , 2016, ArXiv.
[51] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[52] Christian Diedrich,et al. Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[53] Kwangjo Kim,et al. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach , 2016, WISA.
[54] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[55] Xue Wang,et al. Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).
[56] Kwangjo Kim,et al. Deep Learning in Intrusion Detection System: An Overview , 2016 .
[57] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[58] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[59] Xiaohong Yuan,et al. Semi-Supervised Deep Neural Network for Network Intrusion Detection , 2016 .
[60] Samuel Kounev,et al. Evaluating Computer Intrusion Detection Systems , 2015, ACM Comput. Surv..
[61] Ralf C. Staudemeyer,et al. Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .
[62] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[63] Zachary Chase Lipton. A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.
[64] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[65] Bahareh Abolhasanzadeh,et al. Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).
[66] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[67] Feng Jiang,et al. A novel approach for discretization of continuous attributes in rough set theory , 2015, Knowl. Based Syst..
[68] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[69] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[70] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.
[71] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[72] Linda Busk Linnebjerg,et al. The benefits of CROS aids for individuals with unilateral sensorineural hearing loss , 2014 .
[73] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[74] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .
[75] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[76] F. van der Meer,et al. Induction of Toll-like receptor 4 signaling in avian macrophages inhibits infectious laryngotracheitis virus replication in a nitric oxide dependent way. , 2013, Veterinary immunology and immunopathology.
[77] Yann LeCun,et al. Regularization of Neural Networks using DropConnect , 2013, ICML.
[78] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[79] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[80] Nitish Srivastava,et al. Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.
[81] Geoffrey E. Hinton. A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.
[82] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[83] Longy O. Anyanwu,et al. Scalable Intrusion Detection with Recurrent Neural Networks , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[84] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[85] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[86] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[87] Yoshua Bengio,et al. Classification using discriminative restricted Boltzmann machines , 2008, ICML '08.
[88] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[89] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[90] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[91] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[92] Guofei Gu,et al. Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.
[93] Juan E. Tapiador,et al. Anomaly detection methods in wired networks: a survey and taxonomy , 2004, Comput. Commun..
[94] Khaled Labib. Computer security and intrusion detection , 2004, CROS.
[95] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[96] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[97] Emile H. L. Aarts,et al. Boltzmann machines , 1998 .
[98] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[99] Geoffrey E. Hinton,et al. A Learning Algorithm for Boltzmann Machines , 1985, Cogn. Sci..