入侵检测系统的深度学习方法

Niharika A P
{"title":"入侵检测系统的深度学习方法","authors":"Niharika A P","doi":"10.55041/ijsrem33646","DOIUrl":null,"url":null,"abstract":"The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is tool that helps to detect intrusions by inspecting the network traffic. A system called an intrusion detection system (IDS) observes network traffic for malicious transactions and sends immediate alerts when it is observed. It is software that checks a network or system for malicious activities or policy violations. Each illegal activity or violation is often recorded and notified to an administrator. IDS monitors a network or system for malicious activity and protects a computer network from unauthorized access from users, including perhaps insiders. The intrusion detector learning task is to build a predictive model capable of distinguishing between ‘malicious connections’ and ‘genuine connections’. Keywords: Cyber security, intrusion detection, malware, machine learning, deep learning, deep neural networks, CNN,","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"48 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deep Learning Approach for Intrusion Detection System\",\"authors\":\"Niharika A P\",\"doi\":\"10.55041/ijsrem33646\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is tool that helps to detect intrusions by inspecting the network traffic. A system called an intrusion detection system (IDS) observes network traffic for malicious transactions and sends immediate alerts when it is observed. It is software that checks a network or system for malicious activities or policy violations. Each illegal activity or violation is often recorded and notified to an administrator. IDS monitors a network or system for malicious activity and protects a computer network from unauthorized access from users, including perhaps insiders. The intrusion detector learning task is to build a predictive model capable of distinguishing between ‘malicious connections’ and ‘genuine connections’. Keywords: Cyber security, intrusion detection, malware, machine learning, deep learning, deep neural networks, CNN,\",\"PeriodicalId\":13661,\"journal\":{\"name\":\"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT\",\"volume\":\"48 2\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55041/ijsrem33646\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55041/ijsrem33646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

互联网和通信的快速发展导致传输的数据大量增加。攻击者觊觎这些数据,并不断制造新的攻击手段来窃取或破坏这些数据。这些攻击的增长是我们系统安全的一个问题,也是入侵检测面临的最大挑战之一。入侵检测系统(IDS)是一种通过检测网络流量来帮助检测入侵的工具。被称为入侵检测系统(IDS)的系统会观察网络流量中的恶意交易,并在观察到恶意交易时立即发出警报。它是一种检查网络或系统是否存在恶意活动或违反策略行为的软件。每项非法活动或违规行为通常都会被记录下来并通知管理员。IDS 监控网络或系统的恶意活动,保护计算机网络免受用户(可能包括内部人员)未经授权的访问。入侵探测器的学习任务是建立一个能够区分 "恶意连接 "和 "真实连接 "的预测模型。关键词网络安全 入侵检测 恶意软件 机器学习 深度学习 深度神经网络 CNN
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Deep Learning Approach for Intrusion Detection System
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is tool that helps to detect intrusions by inspecting the network traffic. A system called an intrusion detection system (IDS) observes network traffic for malicious transactions and sends immediate alerts when it is observed. It is software that checks a network or system for malicious activities or policy violations. Each illegal activity or violation is often recorded and notified to an administrator. IDS monitors a network or system for malicious activity and protects a computer network from unauthorized access from users, including perhaps insiders. The intrusion detector learning task is to build a predictive model capable of distinguishing between ‘malicious connections’ and ‘genuine connections’. Keywords: Cyber security, intrusion detection, malware, machine learning, deep learning, deep neural networks, CNN,
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信