Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

10/04/2022
by   Sotiris Moschoyiannis, et al.
0

n this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches. The dataset plays an important role in intrusion detection, therefore we describe 35 well-known cyber datasets and provide a classification of these datasets into seven categories; namely, network traffic-based dataset, electrical network-based dataset, internet traffic-based dataset, virtual private network-based dataset, android apps-based dataset, IoT traffic-based dataset, and internet-connected devices-based dataset. We analyze seven deep learning models including recurrent neural networks, deep neural networks, restricted Boltzmann machines, deep belief networks, convolutional neural networks, deep Boltzmann machines, and deep autoencoders. For each …

READ FULL TEXT

page 1

page 3

page 12

research
12/15/2018

A short review on Applications of Deep learning for Cyber security

Deep learning is an advanced model of traditional machine learning. This...
research
12/15/2020

Intrusion detection in computer systems by using artificial neural networks with Deep Learning approaches

Intrusion detection into computer networks has become one of the most im...
research
05/22/2022

A review on Deep Neural Network for Computer Network Traffic Classification

Focus on Deep Neural Network based malicious and normal computer Network...
research
07/24/2020

A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures

Volunteer computing uses Internet-connected devices (laptops, PCs, smart...
research
06/20/2021

Artificial Neural Network for Cybersecurity: A Comprehensive Review

Cybersecurity is a very emerging field that protects systems, networks, ...
research
07/05/2022

An Intrusion Detection System based on Deep Belief Networks

The rapid growth of connected devices has led to the proliferation of no...
research
03/06/2019

A Survey of Network-based Intrusion Detection Data Sets

Labeled data sets are necessary to train and evaluate anomaly-based netw...

Please sign up or login with your details

Forgot password? Click here to reset