Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks
Main Article Content
Abstract
Article Details
References
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, Deep learning approach for intelligent intrusion detection system, IEEE Access, vol. 7, pp. 41525–41550, 2019.
A. Aldweesh, A. Derhab, and A. Z. Emam, Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues, Knowledge-Based Syst., vol. 189, p. 105124, 2020.
S. Dua and X. Du, Data mining and machine learning in cybersecurity. CRC press, 2016.
H. Liu and B. Lang, Machine learning and deep learning methods for intrusion detection systems: A survey, Appl. Sci., vol. 9, no. 20, p. 4396, 2019.
G. Karatas, O. Demir, and O. K. Sahingoz, Deep learning in intrusion detection systems, in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018, pp. 113–116.
P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 686–728, 2018.
A. Azab, M. Alazab, and M. Aiash, Machine learning based botnet identification traffic, in 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 1788–1794.
G. E. Hinton, A practical guide to training restricted Boltzmann machines, in Neural networks: Tricks of the trade, Springer, 2012, pp. 599–619.
A. Graves, A. Mohamed, and G. Hinton, Speech recognition with deep recurrent neural networks, in 2013 IEEE international conference on acoustics, speech and signal processing, 2013, pp. 6645–6649.
A. Graves and N. Jaitly, Towards end-to-end speech recognition with recurrent neural networks, in international conference on machine learning, 2014, pp. 1764–1772.
I. Sutskever, O. Vinyals, and Q. V Le, Sequence to sequence learning with neural networks, in Advances in neural information processing systems, 2014, pp. 3104–3112.
R. I. Dr. Hassan Alahmad, Using Neural Networks to Build an Intrusion Detection System based on Standard Dataset (KDD99), Tishreen Univ. J. Res. Sci. Stud. - Eng. Sci. Ser., vol. 39, no. 5, pp. 287–310, 2017.
V. N. Tiwari, S. Rathore, and K. Patidar, Enhanced Method for Intrusion Detection over KDD Cup 99 Dataset.
W. Lee, S. J. Stolfo, and K. W. Mok, Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., vol. 14, no. 6, pp. 533–567, 2000.
KDD99 Dataset., 1999. [Online]. Available: https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [Accessed: 16-Oct-2019].
Eastmount, Intrusion detection and attack recognition based on machine learning KDD CUP99 dataset as an example, 2019. [Online]. Available: https://www.arabicprogrammer.com/article/7432839791/. [Accessed: 23-Nov-2019].
A. Özgür and H. Erdem, A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015, PeerJ Prepr., vol. 4, p. e1954v1, 2016.
M. A. Al-Shabi, Credit card fraud detection using autoencoder model in unbalanced datasets, J. Adv. Math. Comput. Sci., pp. 1–16, 2019.
C. Yin, Y. Zhu, J. Fei, and X. He, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, vol. 5, pp. 21954–21961, 2017.
W.-H. Lin, H.-C. Lin, P. Wang, B.-H. Wu, and J.-Y. Tsai, Using convolutional neural networks to network intrusion detection for cyber threats, in 2018 IEEE International Conference on Applied System Invention (ICASI), 2018, pp. 1107–1110.
R. K. Vigneswaran, R. Vinayakumar, K. P. Soman, and P. Poornachandran, Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security, in 2018 9th International conference on computing, communication and networking technologies (ICCCNT), 2018, pp. 1–6.
B. Alsughayyir, A. M. Qamar, and R. Khan, developing a network attack detection system using deep learning, in 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1–5.