Comparison deep learning method to traditional methods using for network intrusion detection

Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring securit...

Full description

Saved in:
Bibliographic Details
Published in2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) pp. 581 - 585
Main Authors Bo Dong, Xue Wang
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2016
Subjects
Online AccessGet full text
DOI10.1109/ICCSN.2016.7586590

Cover

Abstract Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection.
AbstractList Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection.
Author Xue Wang
Bo Dong
Author_xml – sequence: 1
  surname: Bo Dong
  fullname: Bo Dong
  email: dongbo@lnu.edu.cn
  organization: Comput. Center, Liaoning Univ., Shenyang, China
– sequence: 2
  surname: Xue Wang
  fullname: Xue Wang
  email: wangxue@lnu.edu.cn
  organization: Inf. Technol. Center, Liaoning Univ., Shenyang, China
BookMark eNotj81KxDAURiPoQsd5Ad3kBVpv0iTtXUrxZ2DQxbgUhrS90WCbDGlEfHsd7eqDw-HAd8FOQwzE2JWAUgjAm03b7p5KCcKUtW6MRjhha6wboQFB1DXiOXtt43Swyc8x8IHowEeyKfjwxifK73HgOfKc7OCzj8GOC53553x0XEw8UP6K6YP7kNMv_etk6o_-JTtzdpxpveyK7e7vXtrHYvv8sGlvt4VHyEXjlNJVpaVy2hgkaUD1UqF2lpqmFySVttpC3XX9QAJAO9GRNohSgIRqxa7_q56I9ofkJ5u-98vj6gf-wVEt
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCSN.2016.7586590
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781509017799
9781509017812
150901781X
1509017798
EndPage 585
ExternalDocumentID 7586590
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-8f44533524f5669e2604c2495fae88c1e245a5a07bbcde1005f1be5699210203
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:51 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-8f44533524f5669e2604c2495fae88c1e245a5a07bbcde1005f1be5699210203
PageCount 5
ParticipantIDs ieee_primary_7586590
PublicationCentury 2000
PublicationDate 2016-June
PublicationDateYYYYMMDD 2016-06-01
PublicationDate_xml – month: 06
  year: 2016
  text: 2016-June
PublicationDecade 2010
PublicationTitle 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)
PublicationTitleAbbrev ICCSN
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8223065
Snippet Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been...
SourceID ieee
SourceType Publisher
StartPage 581
SubjectTerms classifier machine learning
Communication networks
deep learning
Feature extraction
Hardware
Intrusion detection
Machine learning
network security
Software
Title Comparison deep learning method to traditional methods using for network intrusion detection
URI https://ieeexplore.ieee.org/document/7586590
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT55UWvHNHjyaNG02jz0HSxVahCr0IJR9zJYgpEXTi7_e2WxaUTx4C0vIY4dkvtn9vvkAblOVu46ANkCueUD5Ng8I1UsKiKDsO9KUU5waeTpLJy_8cZEsOnC318IgYkM-w9AdNnv5Zq23bqlsQNg2TQQV6AdZJrxWa6eDicTgoSjmM0fWSsP2xB-OKU3CGB_BdHcrzxN5C7e1CvXnry6M_32WY-h_S_PY0z7pnEAHqx68Fns3QWYQN6z1glgxbxDN6jWr36Up_cJfO_rBHOl9xQi2ssqzwVlZORFG2VynblhaVR_m4_vnYhK0tglBKaI6yC3niVNScUtQTSAVLFw7h2krMc_1EEc8kYmMMqW0wSF9hXaoMEmFcNVfFJ9Ct1pXeAbMjCyPMxNbgng8sxkhydgqI3XKc0n_iXPouXlZbnxfjGU7JRd_D1_CoYuNp1ldQZdeB68podfqponkF2IsoyI
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5jHvSksom_zcGj7bo1aZtzcWy6DWETdhBGkr6MInRjdhf_el-abqJ48FZC6Y882u-95PveR8h9pBLbEdB4wDTzEG8TD7N6iQERiL49jZhi1cjjSTR4ZU9zPm-Qh70WBgAq8hn49rDay89WemuXyjqY20ZcYIF-wLGqiJ1aa6eECURnmKbTiaVrRX596g_PlAoy-sdkvLuZY4q8-9tS-frzVx_G_z7NCWl_i_Poyx52TkkDihZ5S_d-gjQDWNPaDWJJnUU0LVe03Mgsd0t_9egHtbT3JcXElRaOD07zwsow8uo6ZcXTKtpk2n-cpQOvNk7wchGUXmIY41ZLxQwmawKwZGHaekwbCUmiu9BjXHIZxErpDLr4HZquAh4JYeu_IDwjzWJVwDmhWc-wMM5Cg0kei02MuWRoVCZ1xBKJf4oL0rLzsli7zhiLekou_x6-I4eD2Xi0GA0nz1fkyMbJka6uSRNfDW4Q3kt1W0X1CyCjpnM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+8th+IEEE+International+Conference+on+Communication+Software+and+Networks+%28ICCSN%29&rft.atitle=Comparison+deep+learning+method+to+traditional+methods+using+for+network+intrusion+detection&rft.au=Bo+Dong&rft.au=Xue+Wang&rft.date=2016-06-01&rft.pub=IEEE&rft.spage=581&rft.epage=585&rft_id=info:doi/10.1109%2FICCSN.2016.7586590&rft.externalDocID=7586590