Deep learning methods applied to intrusion detection: survey, taxonomy and challenges

O Lifandali, N Abghour - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Because of the popularity of the Internet of Things (IoT), the rapid expansion of computer
networks, and the vast number of important applications, cyber security has lately garnered …

基于深度学习的网络入侵检测研究综述

张勇东, 陈思洋, 彭雨荷, 杨坚 - 广州大学学报(自然科学版), 2019 - cqvip.com
互联网的不断发展与广泛使用给网络用户带来了极大的方便, 但同时也使得网络安全形势变得越
来越严峻. 传统的基于签名的入侵检测方法难以应对日益增多的加密攻击检测和零日攻击检测 …

[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security

KP Soman, M Alazab, S Sriram - Authorea Preprints, 2023 - techrxiv.org
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …

Intrusion detection based on spatiotemporal characterization of cyberattacks

J Kim, HS Kim - Electronics, 2020 - mdpi.com
As attack techniques become more sophisticated, detecting new and advanced cyberattacks
with traditional intrusion detection techniques based on signature and anomaly is becoming …

Human activity recognition making use of long short-term memory techniques

R Wainwright, A Shenfield - Athens Journal of Sciences, 2019 - shura.shu.ac.uk
The optimisation and validation of a classifiers performance when applied to real world
problems is not always effectively shown. In much of the literature describing the application …

A semantic parsing based LSTM model for intrusion detection

Z Li, Z Qin - … : 25th International Conference, ICONIP 2018, Siem …, 2018 - Springer
Nowadays, with the great success of deep learning technology, using deep learning method
to solve information security issues has become a study hot spot. Although some literal …

Intrusion prediction and detection with deep sequence modeling

G Sarraf, MS Swetha - International Symposium on Security in Computing …, 2019 - Springer
With the wide adoption of the internet and its applications in recent years, many antagonists
have been exploiting information exchange for malicious activities. Intrusion detection and …

[PDF][PDF] Predicting time series using integration of moving average and support vector regression

C Hung, CN Hung, SY Lin - International Journal of Machine Learning and …, 2014 - ijmlc.org
Time series prediction is one of the major tasks in the field of data mining. The approaches
of time series prediction can be divided into statistical techniques and computational …

[PDF][PDF] Обнаружение компьютерных атак при использовании многослойного персептрона и сетей с долгой краткосрочной памятью

ББ Борисенко, СД Ерохин, АС Фадеев… - Системы …, 2021 - media-publisher.ru
Аннотация В статье рассмотрены архитектура и структура наиболее эффективных в
задачах классификации сетевого трафика искусственных нейронных сетей (ИНС) …

A self-adaptive intrusion detection model based on bi-LSTM-CRF with historical access logs

Y Wei, F Wu - Advances in Natural Computation, Fuzzy Systems and …, 2022 - Springer
Intrusion detection mechanism is an important way to protect user data privacy. In the
traditional network intrusion detection model, once security policies and rules are …