Abstract
This chapter discusses the importance of IDS in computer networks while wireless networks grow rapidly these days by providing a survey of a security breach in wireless networks. Many methods have been used to improve IDS performance, the most promising one is to deploy machine learning. Then, the usefulness of recent models of machine learning, called a deep learning, is highlighted to improve IDS performance, particularly as a Feature Learning (FL) approach. We also explain the motivation of surveying deep learning-based IDSs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Cisco Visual Networking Index: Forecast and Methodology 2015–2020, published at www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html
References
A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H. Tullberg, M. A. Uusitalo, B. Timus, and M. Fallgren, “Scenarios for 5G mobile and wireless communications: The vision of the metis project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26–35, May 2014.
C. Kolias, A. Stavrou, J. Voas, I. Bojanova, and R. Kuhn, “Learning internet-of-things security” hands-on”,” IEEE Security Privacy, vol. 14, no. 1, pp. 37–46, 2016.
M. Alvarez, N. Bradley, P. Cobb, S. Craig, R. Iffert, L. Kessem, J. Kravitz, D. McMilen, and S. Moore, “IBM X-force threat intelligence index 2017,” IBM Corporation, pp. 1–30, 2017.
C. Kolias, G. Kambourakis, and M. Maragoudakis, “Swarm intelligence in intrusion detection: A survey,” Computers & Security, vol. 30, no. 8, pp. 625–642, 2011.
A. G. Fragkiadakis, V. A. Siris, N. E. Petroulakis, and A. P. Traganitis, “Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection,” Wireless Communications and Mobile Computing, vol. 15, no. 2, pp. 276–294, 2015.
R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in Proc. Symp. Security and Privacy, Berkeley, California. IEEE, 2010, pp. 305–316.
G. Anthes, “Deep learning comes of age,” Communications of the ACM, vol. 56, no. 6, pp. 13–15, 2013.
A. H. Farooqi and F. A. Khan, “Intrusion detection systems for wireless sensor networks: A survey,” in Proc. Future Generation Information Technology Conference, Jeju Island, Korea. Springer, 2009, pp. 234–241.
R. Zuech, T. M. Khoshgoftaar, and R. Wald, “Intrusion detection and big heterogeneous data: a survey,” Journal of Big Data, vol. 2, no. 1, p. 3, 2015.
J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural Networks, vol. 61, pp. 85–117, 2015.
L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and Information Processing, vol. 3, 2014.
L. Deng, D. Yu, et al., “Deep learning: methods and applications,” Foundations and Trends® in Signal Processing, vol. 7, no. 3–4, pp. 197–387, 2014.
D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van Den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, et al., “Mastering the game of go with deep neural networks and tree search,” Nature, vol. 529, no. 7587, pp. 484–489, 2016.
H. Motoda and H. Liu, “Feature selection, extraction and construction,” Communication of IICM (Institute of Information and Computing Machinery), Taiwan, vol. 5, pp. 67–72, 2002.
B. Tran, S. Picek, and B. Xue, “Automatic feature construction for network intrusion detection,” in Asia-Pacific Conference on Simulated Evolution and Learning. Springer, 2017, pp. 569–580.
M. E. Aminanto, R. Choi, H. C. Tanuwidjaja, P. D. Yoo, and K. Kim, “Deep abstraction and weighted feature selection for Wi-Fi impersonation detection,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 3, pp. 621–636, 2018.
T. Hamed, J. B. Ernst, and S. C. Kremer, “A survey and taxonomy on data and pre-processing techniques of intrusion detection systems,” in Computer and Network Security Essentials. Springer, 2018, pp. 113–134.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature
About this chapter
Cite this chapter
Kim, K., Aminanto, M.E., Tanuwidjaja, H.C. (2018). Introduction. In: Network Intrusion Detection using Deep Learning. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1444-5_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-1444-5_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1443-8
Online ISBN: 978-981-13-1444-5
eBook Packages: Computer ScienceComputer Science (R0)