Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey

被引:50
作者
Wu, Yirui [1 ]
Wei, Dabao [1 ]
Feng, Jun [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing, Peoples R China
基金
国家重点研发计划;
关键词
Benchmarking - Convolutional neural networks - Cybersecurity - Generative adversarial networks - Learning systems - Recurrent neural networks - Learning algorithms;
D O I
10.1155/2020/8872923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have emerged to wireless communication system, especially in cybersecurity. In this paper, we offer a review on attack detection methods involving strength of deep learning techniques. Specifically, we firstly summarize fundamental problems of network security and attack detection and introduce several successful related applications using deep learning structure. On the basis of categorization on deep learning methods, we pay special attention to attack detection methods built on different kinds of architectures, such as autoencoders, generative adversarial network, recurrent neural network, and convolutional neural network. Afterwards, we present some benchmark datasets with descriptions and compare the performance of representing approaches to show the current working state of attack detection methods with deep learning structures. Finally, we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.
引用
收藏
页数:17
相关论文
共 70 条
[1]  
Aftergood S, 2017, NATURE, V547, P30, DOI 10.1038/547030a
[2]   A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data [J].
Agarap, Abien Fred M. .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :26-30
[3]  
Aleesa A., 2019, REV INTRUSION DETECT, P1
[4]   Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks [J].
AlEroud, Ahmed ;
Karabatis, George .
PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, :53-60
[5]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[6]  
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]
[7]  
Aminanto E., 2016, P 2016 INT RES C ENG
[8]  
Anderson H S, 2016, Predicting domain generation algorithms with long short-term memory networks
[9]  
[Anonymous], 2018, A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
[10]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026