مشخصات مقاله | |
ترجمه عنوان مقاله | رویکردهای یادگیری عمیق برای سیستم های تشخیص نفوذ مبتنی بر ناهنجاری: بررسی، طبقه بندی و موضوعات باز |
عنوان انگلیسی مقاله | Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues |
انتشار | مقاله سال 2020 |
تعداد صفحات مقاله انگلیسی | 37 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس میباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
6.610 در سال 2019 |
شاخص H_index | 94 در سال 2020 |
شاخص SJR | 1.460 در سال 2019 |
شناسه ISSN | 0950-7051 |
شاخص Quartile (چارک) | Q1 در سال 2019 |
مدل مفهومی | دارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | هوش مصنوعی، امنیت اطلاعات |
نوع ارائه مقاله |
ژورنال |
مجله | سیستم های دانش بنیان – Knowledge-Based Systems |
دانشگاه | King Saud University, Riyadh, 12372, Saudi Arabia |
کلمات کلیدی | تشخیص نفوذ، تشخیص ناهنجاری، یادگیری عمیق |
کلمات کلیدی انگلیسی | Intrusion detection, Anomaly detection, Deep learning |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.knosys.2019.105124 |
کد محصول | E14199 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract 1. Introduction 2. Related surveys 3. Background of deep learning architectures 4. Intrusion detection system (IDS) 5. Taxonomy of a deep learning-based IDS 6. Descriptive and comparative study of deep learning-based IDS methods 7. Discussion and findings 8. Challenges and future directions 9. Conclusion Acknowledgements References |
بخشی از متن مقاله: |
Abstract
The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the importance of developing advanced intrusion detection systems (IDSs). Deep learning is an advanced branch of machine learning, composed of multiple layers of neurons that represent the learning process. Deep learning can cope with large-scale data and has shown success in different fields. Therefore, researchers have paid more attention to investigating deep learning for intrusion detection. This survey comprehensively reviews and compares the key previous deep learningfocused cybersecurity surveys. Through an extensive review, this survey provides a novel finegrained taxonomy that categorizes the current state-of-the-art deep learning-based IDSs with respect to different facets, including input data, detection, deployment, and evaluation strategies. Each facet is further classified according to different criteria. This survey also compares and discusses the related experimental solutions proposed as deep learning-based IDSs. By analysing the experimental studies, this survey discusses the role of deep learning in intrusion detection, the impact of intrusion detection datasets, and the efficiency and effectiveness of the proposed approaches. The findings demonstrate that further effort is required to improve the current state-of-the art. Finally, open research challenges are identified, and future research directions for deep learning-based IDSs are recommended. Introduction In recent years, the world has witnessed a significant evolution in the different areas of connected technologies such as smart grids, the Internet of vehicles, long-term evolution, and 5G communication. By 2022, it is expected that the number of IP-connected devices will be three times larger than the global population, producing 4.8 ZB of IP traffic annually, as reported by Cisco [1]. This accelerated growth raises overwhelming security concerns due to the exchange of huge amounts of sensitive information through resource-constrained devices and over the untrusted “Internet” using heterogeneous technologies and communication protocols. To maintain sustainable and secure cyberspace, advanced security controls and resilience analysis [2] should be applied in the earlier stages before deployment. The applied security controls are responsible for preventing, detecting, and responding to attacks. For detection purposes, an intrusion detection system (IDS) is a widely used technique for detecting internal and external intrusions that target a system, as well as anomalies that indicate potential intrusions and suspicious activities. An IDS involves a set of tools and mechanisms for monitoring the computer system and the network traffic, in addition to analysing activities with the aim of detecting possible intrusions targeting the system [3]. An IDS can be implemented as signature-based, anomaly-based, or hybrid IDS. In signature-based IDS, intrusions are detected by comparing monitored behaviours with pre-defined intrusion patterns, while anomaly-based IDS focuses on knowing normal behaviour in order to identify any deviation [4]. Different techniques are used to detect anomalies, such as statistical-based, knowledge-based, and machine learning techniques; recently, deep learning methods have been investigated [5]. |