Abstract
Intrusion Detection Systems (IDSs) have a significant role in all networks and information systems in the world to earn the required security guarantee. IDS is one of the solutions used to reduce malicious attacks. As attackers always changing their techniques of attack and find alternative attack methods, IDS must also evolve in response by adopting more sophisticated methods of detection. The huge growth in the data and the significant advances in computer hardware technologies resulted in the new studies existence in the deep learning field, including intrusion detection. Deep learning is sub-field of Machine Learning (ML) methods that are based on learning data representations. In this paper, a detailed survey of various deep learning methods applied in IDSs is given first. Then, a deep learning classification scheme is presented and the main works that have been reported in the deep learning works is summarized. Utilizing this approach, we have provided a taxonomy survey on the available deep architectures and algorithms in these works and classify those algorithms to three classes, which are: discriminative, hybrid and generative. After that, chosen deep learning applications are reviewed in a wide range of fields of intrusion detection. Finally, popular types of datasets and frameworks are discussed.
Highlights
The security of computer and network systems has been in the focal point of research for a long time
We have presented an overview of deep learning and what the most definitions emphasize on
We have reviewed the latest papers of deep learning in the intrusion detection domain
Summary
The security of computer and network systems has been in the focal point of research for a long time. Every day there are new types of cyber-attacks that are faced by systems and networks of official and nonofficial organizations, e-commerce and even people around the world. Deep learning has become a very important and successful research trend in the ML community because of its great success in these fields [9] In this survey, we give an overview of the most recent papers that have used deep learning approaches in intrusion detection systems
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Periodicals of Engineering and Natural Sciences (PEN)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.