{"title":"使用深度学习技术的入侵检测","authors":"Syeda Fareeha Batool, Faisal Rehman, Hana Sharif, Maheen Jaffer, Anza Gul, Sameen Butt","doi":"10.1109/ICONICS56716.2022.10100584","DOIUrl":null,"url":null,"abstract":"All firms use intrusion detection systems as a fundamental element of their cyber security procedures. As more and more information become accessible in digital form on the internet, the demand for robust cyber security measures to protect against data breaches and malware assaults has grown. Automated intrusion detection systems are needed to keep pace with the ever-increasing number of assaults and new malware varieties. Computer vision, natural language processing, and voice recognition are all examples of applications of Deep Learning methods that are currently being used in the realm of cyber security. An in-depth analysis of twenty-three papers using Deep Learning in intrusion detection systems is performed in this study.","PeriodicalId":308731,"journal":{"name":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Intrusion Detection using Deep Learning Techniques\",\"authors\":\"Syeda Fareeha Batool, Faisal Rehman, Hana Sharif, Maheen Jaffer, Anza Gul, Sameen Butt\",\"doi\":\"10.1109/ICONICS56716.2022.10100584\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"All firms use intrusion detection systems as a fundamental element of their cyber security procedures. As more and more information become accessible in digital form on the internet, the demand for robust cyber security measures to protect against data breaches and malware assaults has grown. Automated intrusion detection systems are needed to keep pace with the ever-increasing number of assaults and new malware varieties. Computer vision, natural language processing, and voice recognition are all examples of applications of Deep Learning methods that are currently being used in the realm of cyber security. An in-depth analysis of twenty-three papers using Deep Learning in intrusion detection systems is performed in this study.\",\"PeriodicalId\":308731,\"journal\":{\"name\":\"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONICS56716.2022.10100584\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONICS56716.2022.10100584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection using Deep Learning Techniques
All firms use intrusion detection systems as a fundamental element of their cyber security procedures. As more and more information become accessible in digital form on the internet, the demand for robust cyber security measures to protect against data breaches and malware assaults has grown. Automated intrusion detection systems are needed to keep pace with the ever-increasing number of assaults and new malware varieties. Computer vision, natural language processing, and voice recognition are all examples of applications of Deep Learning methods that are currently being used in the realm of cyber security. An in-depth analysis of twenty-three papers using Deep Learning in intrusion detection systems is performed in this study.