Deep Learning Approach for Intrusion Detection System

Niharika A P
{"title":"Deep Learning Approach for Intrusion Detection System","authors":"Niharika A P","doi":"10.55041/ijsrem33646","DOIUrl":null,"url":null,"abstract":"The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is tool that helps to detect intrusions by inspecting the network traffic. A system called an intrusion detection system (IDS) observes network traffic for malicious transactions and sends immediate alerts when it is observed. It is software that checks a network or system for malicious activities or policy violations. Each illegal activity or violation is often recorded and notified to an administrator. IDS monitors a network or system for malicious activity and protects a computer network from unauthorized access from users, including perhaps insiders. The intrusion detector learning task is to build a predictive model capable of distinguishing between ‘malicious connections’ and ‘genuine connections’. Keywords: Cyber security, intrusion detection, malware, machine learning, deep learning, deep neural networks, CNN,","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55041/ijsrem33646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is tool that helps to detect intrusions by inspecting the network traffic. A system called an intrusion detection system (IDS) observes network traffic for malicious transactions and sends immediate alerts when it is observed. It is software that checks a network or system for malicious activities or policy violations. Each illegal activity or violation is often recorded and notified to an administrator. IDS monitors a network or system for malicious activity and protects a computer network from unauthorized access from users, including perhaps insiders. The intrusion detector learning task is to build a predictive model capable of distinguishing between ‘malicious connections’ and ‘genuine connections’. Keywords: Cyber security, intrusion detection, malware, machine learning, deep learning, deep neural networks, CNN,
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
入侵检测系统的深度学习方法
互联网和通信的快速发展导致传输的数据大量增加。攻击者觊觎这些数据,并不断制造新的攻击手段来窃取或破坏这些数据。这些攻击的增长是我们系统安全的一个问题,也是入侵检测面临的最大挑战之一。入侵检测系统(IDS)是一种通过检测网络流量来帮助检测入侵的工具。被称为入侵检测系统(IDS)的系统会观察网络流量中的恶意交易,并在观察到恶意交易时立即发出警报。它是一种检查网络或系统是否存在恶意活动或违反策略行为的软件。每项非法活动或违规行为通常都会被记录下来并通知管理员。IDS 监控网络或系统的恶意活动,保护计算机网络免受用户(可能包括内部人员)未经授权的访问。入侵探测器的学习任务是建立一个能够区分 "恶意连接 "和 "真实连接 "的预测模型。关键词网络安全 入侵检测 恶意软件 机器学习 深度学习 深度神经网络 CNN
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring Vulnerabilities and Threats in Large Language Models: Safeguarding Against Exploitation and Misuse Experimental Investigation of Leachate Treatment Using Low-Cost Adsorbents Exploring Vulnerabilities and Threats in Large Language Models: Safeguarding Against Exploitation and Misuse BANK TRANSACTION USING IRIS AND BIOMETRIC Experimental Investigation of Leachate Treatment Using Low-Cost Adsorbents
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1