Network Intrusion Detection using Deep Learning A Feature Learning Approach
by
 
Kim, Kwangjo. author.

Title
Network Intrusion Detection using Deep Learning A Feature Learning Approach

Author
Kim, Kwangjo. author.

ISBN
9789811314445

Personal Author
Kim, Kwangjo. author.

Physical Description
XVII, 79 p. 30 illus., 11 illus. in color. online resource.

Series
SpringerBriefs on Cyber Security Systems and Networks,

Contents
Chapter 1 Introduction -- Chapter 2 Intrusion Detection Systems -- Chapter 3 Classical Machine Learning and Its Applications to IDS -- Chapter 4 Deep Learning -- Chapter 5 Deep Learning-based IDSs -- Chapter 6 Deep Feature Learning -- Chapter 7 Summary and Further Challenges.

Abstract
This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.

Subject Term
Data protection.
 
Artificial intelligence.
 
Computer security.
 
Wireless communication systems.
 
Mobile communication systems.
 
Big data.
 
Data mining.
 
Security. http://scigraph.springernature.com/things/product-market-codes/I28000
 
Artificial Intelligence. http://scigraph.springernature.com/things/product-market-codes/I21000
 
Systems and Data Security. http://scigraph.springernature.com/things/product-market-codes/I28060
 
Wireless and Mobile Communication. http://scigraph.springernature.com/things/product-market-codes/T24100
 
Big Data. http://scigraph.springernature.com/things/product-market-codes/I29120
 
Data Mining and Knowledge Discovery. http://scigraph.springernature.com/things/product-market-codes/I18030

Added Author
Aminanto, Muhamad Erza.
 
Tanuwidjaja, Harry Chandra.

Added Corporate Author
SpringerLink (Online service)

Electronic Access
https://doi.org/10.1007/978-981-13-1444-5


LibraryMaterial TypeItem BarcodeShelf NumberStatus
IYTE LibraryE-Book2084340-1001QA76.9 .A25Online Springer