首页> 外文期刊>Neural computing & applications >Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
【24h】

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions

机译:基于深度学习技术的入侵检测系统回顾:连贯的分类,挑战,动机,建议,大量分析和未来方向

获取原文
获取原文并翻译 | 示例
           

摘要

This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to the keywords 'deep learning', 'intrusion' and 'attack' and their variations in four major databases, namely Web of Science, ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers' Xplore. These databases are sufficiently broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues. The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology's utility, authors' recommendations and substantial analysis. Then, a result analysis mapping for new directions is discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL.
机译:这项研究和分析了基于深度学习(DL)技术的入侵检测系统(IDS)的研究景观,并识别了该关键研究区的差距。重点是与关键词“深度学习”,“入侵”和“攻击”相关的文章以及四个主要数据库中的变化,即科学,科学教训,Scopus和电气和电子工程师协会的Xplore。这些数据库足够广泛以涵盖技术文献。数据集包含68篇文章。最大比例(72.06%; 49/68)涉及开发一种使用DL方法评估或识别入侵检测技术的方法。第二大比例(22.06%; 15/68)涉及将文章与DL区域,IDS或其他相关问题进行研究/申请。第三大比例(5.88%; 4/68)讨论了运行或采用IDS的框架/模型。该新兴领域的基本特征是从动机的方面确定的,开放挑战阻碍了技术的效用,作者的建议和实质性分析。然后,讨论了新方向的结果分析映射。三个阶段旨在满足以高精度率检测分布式拒绝服务攻击的要求。本研究为基于DL的IDS感兴趣的研究人员提供了广泛的资源背景。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号