CFP last date
20 January 2025
Reseach Article

Detecting Network Intrusion through a Deep Learning Approach

by Abhilasha Jayaswal, Romit Nahar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 14
Year of Publication: 2018
Authors: Abhilasha Jayaswal, Romit Nahar
10.5120/ijca2018916270

Abhilasha Jayaswal, Romit Nahar . Detecting Network Intrusion through a Deep Learning Approach. International Journal of Computer Applications. 180, 14 ( Jan 2018), 15-19. DOI=10.5120/ijca2018916270

@article{ 10.5120/ijca2018916270,
author = { Abhilasha Jayaswal, Romit Nahar },
title = { Detecting Network Intrusion through a Deep Learning Approach },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2018 },
volume = { 180 },
number = { 14 },
month = { Jan },
year = { 2018 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number14/28929-2018916270/ },
doi = { 10.5120/ijca2018916270 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:00:39.932952+05:30
%A Abhilasha Jayaswal
%A Romit Nahar
%T Detecting Network Intrusion through a Deep Learning Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 14
%P 15-19
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion Detection: collection of techniques that are used to identify attacks on the computers and network infrastructures. Anomaly detection, which is a key element of intrusion detection. In Anomaly Detection, perturbations of normal behavior suggest the presence of intentionally or unintentionally induced attacks, faults, defects, etc. This paper focuses on an approach based on deep learning to develop an effective and flexible network intrusion detection system implemented using self-taught learning on NSL-KDD data set.

References
  1. B. Mukherjee, L.T. Heberlein, K.N. Levitt 1994, Network Intrusion Detection
  2. Gustavo Nascimento, Miguel Correia, Anomaly-based Intrusion Detection in Software as a Service
  3. Fiore, Ugo and Palmieri, Francesco and Castiglione, Aniello and De Santis, Alfredo, 2013, “Network Anomaly Detection with the Restricted Boltzmann Machine”
  4. A. Coates, A. Y. Ng, and H. Lee, 2011, “An Analysis of Single-layer Networks in Unsupervised Feature Learning,” in International conference on artificial intelligence and statistics, pp. 215–223.
  5. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium
  6. KDD Cup 99, “http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.”
  7. Quamar Niyaz, Weiqing Sun, Ahmad Y Javaid, and Mansoor Alam, A Deep Learning Approach for Network Intrusion Detection System
Index Terms

Computer Science
Information Sciences

Keywords

Deep learning Network Security NIDS sparse auto encoder.