Cited 109 time in
Deep belief network based intrusion detection techniques: A survey
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Sohn, Insoo | - |
| dc.date.accessioned | 2023-04-27T18:40:16Z | - |
| dc.date.available | 2023-04-27T18:40:16Z | - |
| dc.date.issued | 2021-04-01 | - |
| dc.identifier.issn | 0957-4174 | - |
| dc.identifier.issn | 1873-6793 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/5075 | - |
| dc.description.abstract | With the recent growth in the number of IoT devices, the amount of personal, sensitive, and important data flowing through the global network have grown rapidly. Additionally, the malicious attempt to access important information or damage the network have also become more complex and advanced. Thus, cybersecurity has become an important issue for the evolution toward future networks that can react and counter such threats. Intrusion detection is an important part of the cybersecurity technology with the goal of monitoring and analyzing network traffic from various resources and detect malicious activities. In recent years, deep learning base deep neural network (DNN) techniques have been utilized as the key solution to detect malicious attacks and among many DNNs, deep belief network (DBN) has been the most influential technique. There have been many attempts to survey wide range of machine learning and deep learning technique based intrusion detection research works, including DBN, but failed to provide a complete review of all the aspects related to the DBN based intrusion detection models. Unlike previous survey papers, we first provide basic concepts on data set, performance metric, and restricted Boltzmann machines, to help understand the basic DBN based intrusion detection model. Finally, a complete review and analysis on the previously published works on DBN based IDS models is provided. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | PERGAMON-ELSEVIER SCIENCE LTD | - |
| dc.title | Deep belief network based intrusion detection techniques: A survey | - |
| dc.type | Article | - |
| dc.publisher.location | 영국 | - |
| dc.identifier.doi | 10.1016/j.eswa.2020.114170 | - |
| dc.identifier.scopusid | 2-s2.0-85096520479 | - |
| dc.identifier.wosid | 000640531100022 | - |
| dc.identifier.bibliographicCitation | EXPERT SYSTEMS WITH APPLICATIONS, v.167 | - |
| dc.citation.title | EXPERT SYSTEMS WITH APPLICATIONS | - |
| dc.citation.volume | 167 | - |
| dc.type.docType | Review | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Operations Research & Management Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Operations Research & Management Science | - |
| dc.subject.keywordPlus | LEARNING APPROACH | - |
| dc.subject.keywordPlus | INTERNET | - |
| dc.subject.keywordPlus | MODEL | - |
| dc.subject.keywordAuthor | Cybersecurity | - |
| dc.subject.keywordAuthor | Intrusion detection | - |
| dc.subject.keywordAuthor | Deep belief network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
