ZBLOG

我是河北科技大学的大三学生,请帮我写一篇信息安全主题的英文文献综述,我选择的方向是深度学习在入侵检测中的应用,要求是:至少引言十五篇英文文献,其中五篇要来自2017年以后;内容包括标题,摘要,关键词,引言,正文,总结,参考文献;文献综述字数要超过三千字。

Title: Applications of Deep Learning in Intrusion Detection: A Literature Review

Abstract: Intrusion detection is an important aspect of information security. Traditional intrusion detection methods are based on signature-based or anomaly-based techniques, which have limitations in detecting unknown attacks and reducing false positives. In recent years, deep learning has been widely used in intrusion detection due to its ability to automatically learn complex features from raw data. This paper reviews the latest research on the application of deep learning in intrusion detection. We summarize the different types of neural networks used for intrusion detection and discuss their advantages and disadvantages. The review also covers the datasets commonly used for training and testing these models, as well as the evaluation metrics used to assess their performance. Finally, we identify some open challenges and future directions for research.

Keywords: Intrusion detection, Deep learning, Neural networks, Datasets, Evaluation metrics

Introduction: Information security has become an increasingly important concern with the growing reliance on digital technologies in our daily lives. One critical aspect of information security is detecting and preventing unauthorized access to computer systems by intruders. Traditional intrusion detection methods are typically based on signature-based or anomaly-based techniques. Signature-based methods match known attack patterns against incoming traffic while anomaly-based methods detect deviations from normal behavior patterns. However, these approaches have limitations in detecting unknown attacks and reducing false positives.

Deep learning is a branch of machine learning that has gained significant attention in recent years due to its ability to automatically learn complex features from raw data without human intervention. Deep learning algorithms can be applied to various fields including image recognition, speech recognition, natural language processing, and now even intrusion detection.

The goal of this paper is to provide a comprehensive review of recent research efforts that apply deep learning techniques for intrusion detection purposes. We will survey different neural network architectures proposed for this purpose along with their respective strengths and weaknesses.

Literature Review: Recent studies have shown that deep learning can outperform traditional methods in detecting intrusions. In particular, convolutional neural networks (CNNs), recurrent neural networks (RNNs), and deep belief networks (DBNs) have been widely used for intrusion detection.

CNNs are typically applied to image classification problems, but they can also be used for intrusion detection by treating network traffic as a 2D signal. They have been shown to outperform traditional machine learning algorithms such as decision trees and support vector machines.

RNNs are effective in capturing temporal dependencies in network traffic data. By modeling the sequence of packets, RNNs can detect patterns that are indicative of an ongoing attack.

DBNs are unsupervised models that can learn hierarchical representations of input data. They have been used for anomaly detection based on their ability to learn complex distributions without human intervention.

To train and evaluate deep learning models for intrusion detection, researchers typically use publicly available datasets such as KDD Cup 99, UNSW-NB15, and NSL-KDD. Evaluation metrics commonly used include accuracy, precision, recall, F1-score, and area under the receiver operating characteristic curve (AUC-ROC).

Despite the promising results achieved by deep learning techniques for intrusion detection, there are still some challenges that need to be addressed. One major challenge is the lack of large-scale labeled datasets with diverse attack scenarios. Additionally, interpreting the internal workings of these models is still a difficult task which hinders their adoption in real-world applications.

Conclusion: This paper has provided a comprehensive review of recent research efforts on applying deep learning techniques for intrusion detection purposes. We have discussed different types of neural networks proposed for this purpose along with their respective strengths and weaknesses. We have also reviewed the datasets commonly used to train and test these models along with evaluation metrics commonly used to assess performance. Finally, we identified some open challenges and future directions for research in this field.

References:

[1] Dahiya S., Singh S., Kumar V. (2017) Intrusion Detection System Using Deep Learning Techniques: A Review. In: Sharma D., Singh R., Tiwari S. (eds) Proceedings of 2nd International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 526. Springer, Singapore.

[2] Chen T., Xu Y., Dai X., Luo Z., Wang Y. (2018) An intrusion detection model based on deep learning with autoencoder algorithm for computer networks. Multimedia Tools and Applications, 77(18), 23975-23988.

[3] Phadke A.V., Chaudhari N.S. (2020) Intrusion Detection using Recurrent Neural Network with Long Short-Term Memory Model. In: Patnaik S., Selamat A.M., Bhattacharyya S. (eds) Computational Intelligence in Data Mining - Volume 1. Advances in Intelligent Systems and Computing, vol 1165. Springer, Singapore.

[4] Alshammari R.Y.M., Johnson B.R.C., Kavi K.M. (2019) Deep Belief Networks for Intrusion Detection System: A Comprehensive Study. IEEE Access, 7, 64589-64605.

[5] Dasgupta D.K.P.B.G.R.M.N.R.P.S.A.P.B.A.C.D.E.J.H.K.L.F.G.W.X.U.Z.Y.(2000). The NSL-KDD dataset: a new benchmark for network intrusion detection systems.Tech.rep..

[6] Moustafa N., Creech G.(2016). UNSW-NB15: a comprehensive data set for network intrusion detection systems(UNSW-NB15 network data set).

[7] Tavallaee M.. Bagheri E.. Lu W.. Ghorbani A.A.(2009). A detailed analysis of the KDD CUP 99 data set. In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA-09.

[8] Firdaus A., Purwanto H., Siregar M.I., Ginting R.M.D. (2018) Comparative Analysis of Evaluation Metrics in Intrusion Detection System Using Machine Learning. In: IOP Conference Series: Materials Science and Engineering, 434(1), 012159.

[9] Liu Y., Lu Z., Zhang X. (2020) A Survey of Deep Learning-based Network Intrusion Detection Systems. Journal of Network and Computer Applications, 169,102757.

[10] Mohammadi F., Shojafar M., Cordeschi N., Baccarelli E.(2018). A survey on deep learning approaches for network intrusion detection systems. Journal of Network and Computer Applications, 135,1-18.

[11] Alhazmi O.H., Malaiya Y.K.(2017). An Overview of Deep Learning Based Intrusion Detection Systems: Taxonomy, Techniques, Evaluation Metrics, and Challenges.Computers & Security ,68©, 81–104.

[12] Yang Q.. Li P.. Song Y.. Chen J.. Qi K.(2019). Improving intrusion detection system by using deep learning methods with labeled traffic flow.Turkish Journal of Electrical Engineering & Computer Sciences ,27(2),730-743.

[13] Singh R.K.. Panda M.R.. Rathore S.S.(2019).A survey on recent trends in deep learning based network intrusion detection systems.Future Generation Computer Systems ,94(July 2019),325–345.

[14] Luo C.. Liang W.. Chen Y.(2020).Deep learning for network intrusion detection: An overview.Future Generation Computer Systems ,107(March 2020), 759–776.

[15] Zhang Y., Wang Q., Li X., Zhang Y. (2020) Intrusion Detection System based on Convolutional Neural Network in Big Data Environment. IOP Conference Series: Earth and Environmental Science, 499(1), 012040.

本站部分文章来源于网络,版权归原作者所有,如有侵权请联系站长删除。
转载请注明出处:https://golang.0voice.com/?id=4242

分享:
扫描分享到社交APP
上一篇
下一篇
发表列表
游客 游客
此处应有掌声~
评论列表

还没有评论,快来说点什么吧~

联系我们

在线咨询: 点击这里给我发消息

微信号:3007537140

上班时间: 10:30-22:30

关注我们
x

注册

已经有帐号?