رکورد قبلیرکورد بعدی

" Network Intrusion Detection using Deep Learning : "


Document Type : BL
Record Number : 889909
Main Entry : Kim, Kwangjo
Title & Author : Network Intrusion Detection using Deep Learning : : a Feature Learning Approach /\ Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja.
Publication Statement : Singapore :: Springer,, 2018.
Series Statement : Springer briefs on cyber security systems and networks
Page. NO : 1 online resource
ISBN : 9789811314445
: : 9789811314452
: : 9811314446
: : 9811314454
: 9789811314438
: 9811314438
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Intro; Preface; Acknowledgments; Contents; Acronyms; 1 Introduction; References; 2 Intrusion Detection Systems; 2.1 Definition; 2.2 Classification; 2.3 Benchmark; 2.3.1 Performance Metric; 2.3.2 Public Dataset; References; 3 Classical Machine Learning and Its Applications to IDS; 3.1 Classification of Machine Learning; 3.1.1 Supervised Learning; 3.1.1.1 Support Vector Machine; 3.1.1.2 Decision Tree; 3.1.2 Unsupervised Learning; 3.1.2.1 K-Means Clustering; 3.1.2.2 Ant Clustering; 3.1.2.3 (Sparse) Auto-Encoder; 3.1.3 Semi-supervised Learning; 3.1.4 Weakly Supervised Learning.
: 3.1.5 Reinforcement Learning3.1.6 Adversarial Machine Learning; 3.2 Machine-Learning-Based Intrusion Detection Systems; References; 4 Deep Learning; 4.1 Classification; 4.2 Generative (Unsupervised Learning); 4.2.1 Stacked (Sparse) Auto-Encoder; 4.2.2 Boltzmann Machine; 4.2.3 Sum-Product Networks; 4.2.4 Recurrent Neural Networks; 4.3 Discriminative; 4.4 Hybrid; 4.4.1 Generative Adversarial Networks (GAN); References; 5 Deep Learning-Based IDSs; 5.1 Generative; 5.1.1 Deep Neural Network; 5.1.2 Accelerated Deep Neural Network; 5.1.3 Self-Taught Learning; 5.1.4 Stacked Denoising Auto-Encoder.
: 5.1.5 Long Short-Term Memory Recurrent Neural Network5.2 Discriminative; 5.2.1 Deep Neural Network in Software-Defined Networks; 5.2.2 Recurrent Neural Network; 5.2.3 Convolutional Neural Network; 5.2.4 Long Short-Term Memory Recurrent Neural Network; 5.2.4.1 LSTM-RNN Staudemeyer; 5.2.4.2 LSTM-RNN for Collective Anomaly Detection; 5.2.4.3 GRU in IoT; 5.2.4.4 LSTM-RNN for DDoS; 5.3 Hybrid; 5.3.1 Adversarial Networks; 5.4 Deep Reinforcement Learning; 5.5 Comparison; References; 6 Deep Feature Learning; 6.1 Deep Feature Extraction and Selection; 6.1.1 Methodology; 6.1.2 Evaluation.
: 6.1.2.1 Dataset Preprocessing6.1.2.2 Experimental Result; 6.2 Deep Learning for Clustering; 6.2.1 Methodology; 6.2.2 Evaluation; 6.3 Comparison; References; 7 Summary and Further Challenges; References; Appendix A A Survey on Malware Detection from Deep Learning; A.1 Automatic Analysis of Malware BehaviorUsing Machine Learning; A.2 Deep Learning for Classification of Malware System Call Sequences; A.3 Malware Detection with Deep Neural Network Using Process Behavior; A.4 Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning.
: A.5 Automatic Malware Classification and New Malware Detection Using Machine LearningA. 6 DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification; A.7 Selecting Features to Classify Malware; A.8 Analysis of Machine-Learning Techniques Used in Behavior-Based Malware Detection; A.9 Malware Detection Using Machine-Learning-Based Analysis of Virtual Memory Access Patterns; A.10 Zero-Day Malware Detection; References.
Abstract : This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.
Subject : Computer security.
Subject : Data mining.
Subject : Intrusion detection systems (Computer security)
Subject : Machine learning.
Subject : Artificial intelligence.
Subject : Computer security.
Subject : Computer security.
Subject : COMPUTERS-- General.
Subject : Data mining.
Subject : Data mining.
Subject : Databases.
Subject : Intrusion detection systems (Computer security)
Subject : Machine learning.
Subject : WAP (wireless) technology.
Dewey Classification : ‭006.3/1‬
LC Classification : ‭Q325.5‬
Added Entry : Aminanto, Muhamad Erza
: Tanuwidjaja, Harry Chan
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟