Detailed Information

Cited 78 time in webofscience Cited 109 time in scopus
Metadata Downloads

Deep belief network based intrusion detection techniques: A survey

Full metadata record
DC Field Value Language
dc.contributor.authorSohn, Insoo-
dc.date.accessioned2023-04-27T18:40:16Z-
dc.date.available2023-04-27T18:40:16Z-
dc.date.issued2021-04-01-
dc.identifier.issn0957-4174-
dc.identifier.issn1873-6793-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/5075-
dc.description.abstractWith the recent growth in the number of IoT devices, the amount of personal, sensitive, and important data flowing through the global network have grown rapidly. Additionally, the malicious attempt to access important information or damage the network have also become more complex and advanced. Thus, cybersecurity has become an important issue for the evolution toward future networks that can react and counter such threats. Intrusion detection is an important part of the cybersecurity technology with the goal of monitoring and analyzing network traffic from various resources and detect malicious activities. In recent years, deep learning base deep neural network (DNN) techniques have been utilized as the key solution to detect malicious attacks and among many DNNs, deep belief network (DBN) has been the most influential technique. There have been many attempts to survey wide range of machine learning and deep learning technique based intrusion detection research works, including DBN, but failed to provide a complete review of all the aspects related to the DBN based intrusion detection models. Unlike previous survey papers, we first provide basic concepts on data set, performance metric, and restricted Boltzmann machines, to help understand the basic DBN based intrusion detection model. Finally, a complete review and analysis on the previously published works on DBN based IDS models is provided.-
dc.language영어-
dc.language.isoENG-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.titleDeep belief network based intrusion detection techniques: A survey-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1016/j.eswa.2020.114170-
dc.identifier.scopusid2-s2.0-85096520479-
dc.identifier.wosid000640531100022-
dc.identifier.bibliographicCitationEXPERT SYSTEMS WITH APPLICATIONS, v.167-
dc.citation.titleEXPERT SYSTEMS WITH APPLICATIONS-
dc.citation.volume167-
dc.type.docTypeReview-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaOperations Research & Management Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryOperations Research & Management Science-
dc.subject.keywordPlusLEARNING APPROACH-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusMODEL-
dc.subject.keywordAuthorCybersecurity-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorDeep belief network-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Electronics and Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Sohn, In Soo photo

Sohn, In Soo
College of Engineering (Department of Electronics and Electrical Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE