Published June 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches

  • 1. School of Computing and Information Technology, Murang'a University of Technology, Murang'a, Kenya.

Contributors

Contact person:

  • 1. School of Computing and Information Technology, Murang'a University of Technology, Murang'a, Kenya

Description

Abstract: Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic for signs of malicious activity. In recent years, deep learning based NIDSs have emerged as an active area of research in cybersecurity and several surveys have been done on these systems. Although a plethora of surveys exists covering this burgeoning body of research, there lacks in the literature an empirical analysis of the different hybrid deep learning models. This paper presents a review of hybrid deep learning models for network intrusion detection and pinpoints their characteristics which researchers and practitioners are exploiting to develop modern NIDSs. The paper first elucidates the concept of network intrusion detection systems. Secondly, the taxonomy of hybrid deep learning techniques employed in designing NIDSs is presented. Lastly, a survey of the hybrid deep learning based NIDS is presented. The study adopted the systematic literature review methodology, a formal and systematic procedure by conducting bibliographic review, while defining explicit protocols for obtaining information. The survey results suggest that hybrid deep learning-based models yield desirable performance compared to other deep learning algorithms. The results also indicate that optimization, empirical risk minimization and model complexity control are the most important characteristics in the design of hybrid deep learning-based models. Lastly, key issues in the literature exposed in the research survey are discussed and then propose several potential future directions for researchers and practitioners in the design of deep learning methods for network intrusion detection. 

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

F25300510622.pdf

Files (798.9 kB)

Name Size Download all
md5:b3f1da9f4beab41cc5402d4c92c07b96
798.9 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2319-6378 (ISSN)

References

  • Z. Wang, Z. Li, J. Wang and D. Li, "Network Intrusion Detection Model Based on Improved BYOL Self-Supervised Learning," Security and Communication Networks, vol. 2021, pp. 1-23, 2021.
  • M. Ahmed, A. N. Mahmood and J. Hu, "A survey of network anomaly detection techniques," Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016.
  • W. Liang, S. Xie, D. Zhang, X. Li and K. Li, "A mutual security authentication method for RFID-PUF circuit based on deep learning," ACM Transactions on Internet Technology, pp. 1-20, 2020.
  • A. Khraisat, I. Gondal, P. Vamplew and J. Kamruzzaman, "Survey of intrusion detection systems: techniques, datasets and challenges," Cybersecurity, vol. 2, no. 20, pp. 1-22, 2019.
  • Q. Tian, D. Han, K.-C. Li, X. Liu, L. Duan and A. Castiglione, "An intrusion detection approach based on improved deep belief network," Applied Intelligence, vol. 50, no. 10, pp. 3162-3178, 2020.
  • Z. Ahmad, A. Khan, C. Shiang, J. Abdullah and F. Ahmad, "Network intrusion detection system: A systematic study of machine learning and deep learning approaches," Transactions on Emerging Telecommunications Technologies, vol. 32, pp. 1-23, 2021.
  • B. Dong and X. Wang, "Comparison deep learning method to traditional methods using for network intrusion detection," in Proceedings of the 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 2016.
  • M. ElSayed, N.-A. Le-Khac, M. Albahar and A. Jurcut, "A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique," Journal of Network and Computer Applications, vol. 191, pp. 1-18, 2021.
  • B. Lee, S. Amaresh, C. Green and D. Engels, "Comparative Study of Deep Learning Models for Network Intrusion Detection," SMU Data Science Review, vol. 1, no. 1, pp. 1-14, 2018.
  • M. Al Imran and S. Ripon, "Network Intrusion Detection: An Analytical Assessment Using Deep Learning and State of the Art Machine Learning Models," International Journal of Computational Intelligence Systems, vol. 14, no. 200, pp. 1-20, 2021.
  • J. Lew, D. Shah, S. Pati, S. Cattell, M. Zhang, A. Sandhupatla, C. Ng, N. Goli, M. Sinclair, T. Rogers and T. Aamodt, "Analyzing machine learning workloads using a detailed GPU simulator," in Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Madison, WI, USA, 2019.
  • Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou and C. Wang, "Machine learning and deep learning methods for cybersecurity," IEEE access, vol. 6, pp. 35365-35381, 2018.
  • A. Megantara and T. Ahmad, "A hybrid machine learning method for increasing the performance of network intrusion detection systems," Journal of Big Data, vol. 8, no. 142, pp. 1-19, 2021.
  • K. Scarfone and P. Mell, "SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)," National Institute of Standards & Technology, Gaithersburg, MD, USA, 2007.
  • H. Liao, C. Lin, Y. Lin and K. Tung, "Intrusion detection system: a comprehensive review," Journal of Network Computing Applications, vol. 36, no. 1, pp. 16-24, 2013.
  • D. E. Denning, "An intrusion-detection model," IEEE Transactions in Software Engineering, SE-13, vol. 2, pp. 222-232, 1987. [CrossRef] 17. K. Kim, "Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network," IEICE Transactions on Information and Systems, vol. E103–D, no. 7, pp. 1433-1447, 2020. [CrossRef] 18. T. Riera, J.-R. Higuera, J. Higuera, J.-J. Herraiz and J.-A. Montalvo, "Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review," Sustainability, vol. 12, pp. 1-45, June 2020. [CrossRef] 19. A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman and A. Alazab, "Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine," Electronics, vol. 9, no. 173, pp. 1-18, 2020. [CrossRef] 20. V. Jyothsna and K. Prasad, "Anomaly-Based Intrusion Detection System," in Computer and Network Security, IntechOpen, 2019, pp. 1-15. [CrossRef] 21. Symantec, "Internet security threat report 2017," 17 April 2017. [Online]. Available: https://www.symantec.com/content/dam/symantec/docs/reports/. [Accessed 23 May 2020]. 22. N. Ampah, C. M. Akujuobi, M. N. O. Sadiku and S. Alam, "An intrusion detection technique based on continuous binary communication channels," International Journal of Security and Networks, vol. 6, no. 2-3, pp. 174-180, 2011. [CrossRef] 23. R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-Nemrat and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 4 1525-4 1550, 2019. [CrossRef] 24. R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-Nemrat and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, pp. 41525-41550, 2019. [CrossRef] 25. N. Akhtar and A. Mian, "Threat of adversarial attacks on deep learning in computer vision: A survey," IEEE Access, vol. 6, p. 14410–14430, 2018. [CrossRef] 26. M. Ganaiea, M. Hu, A. Malika, M. Tanveera and P. Suganthan, "Ensemble deep learning: A review," Arxiv pre prints, p. arXiv:2104.02395v2, 2022. 27. D.-A. Clevert, T. Unterthiner and S. Hochreiter, "Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs)," arXiv preprint , p. arXiv:1511.07289, 2016. 28. K. Janocha and W. Czarnecki, "On Loss Functions for Deep Neural Networks in Classification," arXiv Preprints, p. arXiv:1702.05659v1, 18 Feb 2017. [CrossRef] 29. L. Deng and D. Yu, "Deep Learning: Methods and Applications," Foundations and Trends in Signal Processing, vol. 7, no. 3-4, pp. 197-387, 2014. [CrossRef] 30. I. Goodfellow, Y. Bengio and A. Courville, Deep Learning, Cambridge, Massachusetts: MIT Press, 2016. 31. T. Che, X. Liu, S. Li, Y. Ge, R. Zhang, C. Xiong and Y. Bengio, "Deep Verifier Networks: Verification of Deep Discriminative Models with Deep Generative Models," arXiv , p. arXiv:1911.07421v2, 8 Feb 2020. 32. J. Gordon and J. Hernández-Lobato, "Combining deep generative and discriminative models for Bayesian semi-supervised learning," Pattern Recognition, vol. 100, pp. 1-10, 2020. [CrossRef] 33. C. Goyal, "Deep Understanding of Discriminative and Generative Models in Machine Learning," analyticsvidhya, 19 July 2021. [Online]. Available: https://www.analyticsvidhya.com/blog/2021/07/deep-understanding-of-discriminative-and-generative-models-in-machine-learning/. [Accessed 22 March 2022]. 34. W. Sun, H. Liu, R. Tang, Y. Lang, J. He and Q. Huang, "sEMG-Based Hand-Gesture Classification Using a Generative Flow Model," Sensors, vol. 19, no. 1952, pp. 1-16, 2019. [CrossRef] 35. S. Al and M. Dener, "STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment," Computers and Security, vol. 110, no. C, 2021. [CrossRef] 36. A. Tasdelen and B. Sen, "A hybrid CNN-LSTM model for pre-miRNA classification," Scientific Reports, vol. 11, no. 14125, pp. 1-9, 2021. [CrossRef] 37. S. Keele, "Guidelines for Performing Systematic Literature Reviews in Software Engineering," EBSE, 2007. 38. D. Moher, L. Shamseer, M. Clarke, D. Ghersi, A. Liberati, M. Petticrew, P. Shekelle and L. Stewart, "Preferred reporting items for systematic reviewand meta-analysis protocols (PRISMA-P) 2015 statement," Systematic Reviews, vol. 4, no. 1, pp. 1-9, 2015. [CrossRef] 39. A. Alqahtani, "FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks.," The Journal of Supercomputing, vol. 21, 2022. [CrossRef] 40. Y. Zeng, H. Gu, W. Wei and Y. Guo, "Deep-Full-Range: A Deep Learning Based Network Encrypted Traffic Classification andIntrusion Detection Framework," IEEE Access, vol. 7, pp. 45182-45190, 2019. [CrossRef] 41. C. Ma, X. Du and L. Cao, "Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection," IEEE Access, vol. 7, pp. 148363-148380, 2019. [CrossRef] 42. M. ElSayed, N.-A. Le-Khac, M. Albahar and A. Jurcut, "A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique," Journal of Network and Computer Applications, vol. 191, pp. 1-18, 2021. [CrossRef] 43. A. Megantara and T. Ahmad, "A hybrid machine learning method for increasing the performance of network intrusion detection systems," Journal of Big Data, vol. 8, no. 142, pp. 1-19, 2021. [CrossRef] 44. R. Yao, N. Wang, Z. Liu, P. Chen and X. Sheng, "Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach," Sensors, vol. 21, no. 626, pp. 1-17, 2021. [CrossRef] 45. M. Khan, "HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System," Processes, vol. 9, no. 834, pp. 1-14, 2021. [CrossRef] 46. W. Wang, Y. Sheng, J. Wang, X. Zeng, X. Ye, Y. Huang and M. Zhu, "HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection," IEEE Access, vol. 6, pp. 1792-1806, 2017. [CrossRef] 47. W. Wang, Y. Sheng, J. Wang, X. Zeng, X. Ye, Y. Huang and M. Zhu, "HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection," IEEE Access, vol. 6, pp. 1792-1806, 11 December 2017. [CrossRef] 48. Y. Yao, L. Su, Z. Lu and B. Liu, "STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection," in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 2019. 49. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian and G. Fortino, "A hybrid deep learning model for efficient intrusion detection in big data environment," Information Sciences, vol. 513, pp. 386-396, 2020. [CrossRef] 50. P. Sun, P. Liu, Q. Li, C. Liu, X. Lu, R. Hao and J. Chen, "DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System," Security and Communication Networks, vol. 2020, pp. 1-11, 2020. [CrossRef] 51. M. Al-Imran and S. Ripon, "Network Intrusion Detection: An Analytical Assessment Using Deep Learning and State-of-the-Art Machine Learning Models," International Journal of Computational Intelligence Systems, vol. 14, no. 200, pp. 1-20, 2021. [CrossRef] 52. A. M. and N. K., "Convolutional neural networks with LSTM for intrusion detection," in Proceedings of the 35th International Conference, Seville, Spain, 2020. 53. J. Malik, A. Akhunzada, I. Bibi, M. Imran, A. Musaddiq and S. Kim, "Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN," IEEE Access, vol. 8, pp. 134695-134706, 16 July 2020. [CrossRef] 54. Z. Maseer, R. Yusof, S. Mostafa, N. Bahaman, O. Musa and B. A.-S. Al-rimy, "DeepIoT. IDS: hybrid deep learning for enhancing IoT network intrusion detection," Computers, Materials & Continua, vol. 69, no. 3, pp. 3945-3966, 2021. [CrossRef] 55. A. Psathas, L. Iliadis, A. Papaleonidas and D. Bountas, "A Hybrid Deep Learning Ensemble for Cyber Intrusion Detection," in Proceedings of the 22nd Engineering Applications of Neural Networks Conference, 2021. [CrossRef] 56. I. Ullah, A. Ullah and M. Sajjad, "Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks," IoT, vol. 2, no. 3, pp. 428-448, 2021. [CrossRef] 57. X. Li and S. Zhang, "Network Intrusion Detection Methods Based on Deep Learning," Recent Patents on Engineering, vol. 15, no. 4, pp. 80-88(9), 2021. 58. A. A. Süzen, "Developing a multi-level intrusion detection system using hybrid-DBN," Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 1913-1923, 2021. [CrossRef] 59. A. Kim, M. Park and D. H. Lee, "AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection," IEEE Access, vol. 8, pp. 70245-70261, 2020. [CrossRef] 60. P. Wichmann, M. Marx, H. Federrath and M. Fischer, "Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic," in ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 2021. [CrossRef] 61. S. Popoola, B. Adebisi, M. Hammoudeh, G. Gui and H. Gacanin, "Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4944-4956, 15 March 2021. [CrossRef] 62. M. A. Khan, M. R. Karim and Y. Kim, "A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network," Symmetry, vol. 11, no. 4, p. 14, 2019. [CrossRef] 63. M. M. Moussa and L. Alazzawi, "A Hybrid Deep Learning Cyber-Attacks Intrusion Detection System for CAV Path Planning," in 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Lansing, MI, USA, 2021. [CrossRef] 64. Y. Zhang, X. Chen, L. Jin, X. Wang and D. Guo, "Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data," IEEE Access, vol. 7, pp. 37004-37016, 2019. [CrossRef] 65. H. Mennour and S. Mostefai, "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS," in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 2020. [CrossRef] 66. Y. Zhang, H. Zhang, X. Zhang and D. Qi, "Deep Learning Intrusion Detection Model Based on Optimized Imbalanced Network Data," in 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 2018. [CrossRef] 67. K. Rao, K. Rao and P. Reddy, "A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network," Computer Communications, vol. 180, no. C, pp. 77-88, 2021. [CrossRef] 68. N. Khare, P. Devan, C. Chowdhary, S. Bhattacharya, G. Singh, S. Singh and B. Yoon, "SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection," Electronics, vol. 9, no. 4, p. 18, 2020. [CrossRef] 69. M. Anwer, G. Ahmed and A. S. S. Akhunzada, "Intrusion Detection Using Deep Learning," in 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Mauritius, Mauritius, 2021. [CrossRef] 70. L. Matsa, P. G.-A. Zodi-Lusilao and P. F. Bhunu-Shava, "Forward Feature Selection for DDoS Detection on Cross-Plane of Software Defined Network Using Hybrid Deep Learning," in 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC), Windhoek, Namibia, 2021. [CrossRef] 71. J. Awotunde, C. Chakraborty and A. Adeniyi, "Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection," Wireless Communications and Mobile Computing, vol. 2021, p. 17, 2021. [CrossRef] 72. H. Deng and T. Yang, "Network Intrusion Detection Based on Sparse Autoencoder and IGA-BP Network," Wireless Communications and Mobile Computing, vol. 2021, p. 11, 2021. [CrossRef] 73. S. Garg, K. Kaur, N. Kumar and J. J. P. C. Rodrigues, "Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective," IEEE Transactions on Multimedia, vol. 21, no. 3, pp. 566-578, 2019. [CrossRef] 74. D. Javeed, T. Gao, M. T. Khan and I. Ahmad, "A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT)," Sensors, vol. 21, p. 18, 2021. [CrossRef] 75. M. Khan and J. Kim, "Toward Developing Efficient Conv-AE-Based Intrusion Detection System Using Heterogeneous Dataset," Electronics, vol. 9, p. 17, 2020. [CrossRef] 76. S. Garg, K. Kaur, N. Kumar, G. Kaddoum, A. Y. Zomaya and R. Ranjan, "A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks," IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 924-935, 2019. [CrossRef] 77. R. Li, Z. Song, W. Xie, C. Zhang, G. Zhong and X. Pei, "HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection," in Network and System Security. NSS 2021. Lecture Notes in Computer Science, vol. 13041, M. Yang, C. Chen and Y. Liu, Eds., Springer, Cham., 2021. 78. V. K. A. Prabhakaran, "Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection," Neural Computing and Applications, vol. 33, pp. 14459-14479, 2021. [CrossRef] 79. I. Ullah, B. Raza, S. Ali, I. Abbasi, S. Baseer and A. Irshad, "Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System," Security and Communication Networks, vol. 2021, p. 15, 2021. [CrossRef] 80. T. Bakhshi and B. Ghita, "Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning," Security and Communication Networks, vol. 2021, p. 16, 2021. [CrossRef] 81. S. Haider, A. Akhunzada and G. R. M. Ahmed, "Deep Learning based Ensemble Convolutional Neural Network Solution for Distributed Denial of Service Detection in SDNs," in 2019 UK/ China Emerging Technologies (UCET), Glasgow, UK, 2019. [CrossRef] 82. T. Thilagam and R. Aruna, "Intrusion detection for network based cloud computing by custom RC-NN and optimization," ICT Express, vol. 7, no. 4, pp. 512-520, 2021. [CrossRef] 83. M. Roopak, G. Y. Tian and J. Chambers, "An Intrusion Detection System Against DDoS Attacks in IoT Networks," in 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020. [CrossRef] 84. V. Dutta, M. Choraś, M. Pawlicki and R. Kozik, "A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection," Sensors, vol. 20, no. 16, p. 20, 2020. [CrossRef] 85. F. Sarhangian, R. Kashef and M. Jaseemuddin, "Efficient Traffic Classification Using Hybrid Deep Learning," in 2021 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 2021. [CrossRef] 86. I. A. Khan, D. Pi, Z. U. Khan, Y. Hussain and A. Nawaz, "HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems," IEEE Access, vol. 7, pp. 89507-89521, 2019. [CrossRef] 87. N. Thapa, Z. Liu, A. Shaver, A. Esterline, B. Gokaraju and K. Roy, "Secure Cyber Defense: An Analysis of Network Intrusion-Based Dataset CCD-IDSv1 with Machine Learning and Deep Learning Models," Electronics, vol. 10, no. 15, pp. 1-13, 2021. [CrossRef] 88. S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani and A. Al-Barakati, "DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System," Applied Sciences, vol. 10, no. 6, 2020. [CrossRef] 89. Z. Zhao, L. Ge and G. Zhang, "A novel DBN-LSSVM ensemble method for intrusion detection system," in ICCBN 2021: 2021 9th International Conference on Communications and Broadband Networking, 2021. [CrossRef] 90. I. Pustokhina, D. Pustokhin, E. Lydia, P. Garg, A. Kadian and K. Shankar, "Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment," Multimedia Tools and Applications, vol. 126, no. 2, 2021. [CrossRef] 91. S. Khan and A. Akhunzada, "A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)," Computer Communications, vol. 170, pp. 209-216, 2021. [CrossRef] 92. A. Azeezat, O. Adebukola, A. Abayomi-Alli and O. Olushola, "A Conceptual Hybrid Model of DeepConvolutional Neural Network (DCNN)and Long Short-Term Memory (LSTM) for Masquerade Attack Detection," in ICTA 2020: Information and Communication Technology and Applications Third International Conference, Minna, Nigeria, 2021. [CrossRef] 93. G. Altan, "SecureDeepNet-IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems," Transactions on Emerging Telecommunications Technologies, vol. 32, no. 4, 2021. [CrossRef] 94. H. Alkahtani and T. Aldhyani, "Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications," Security and Communication Networks , vol. 2021, p. 23, 2021 . [CrossRef] 95. T.-Y. Kim and S.-B. Cho, "Web traffic anomaly detection using C-LSTM neural networks," Expert Systems with Applications, vol. 106, pp. 66-76, 2018. [CrossRef] 96. H. Mohammad, G. Abdu, A. Ahmed, A. Majed and F. Giancarlo, "A hybrid deep learning model for efficient intrusion detection in big data environment," Information Sciences, vol. 513, pp. 386-396, 2020. [CrossRef] 97. S. J. Bu and S. B. Cho, "A convolutional neural-based learning classifier system for detecting database intrusion via insider attack," Information sciences, vol. 512, pp. 123-136, 2020. [CrossRef] 98. N. Aldahoul, H. A. Karim and A. Wazir, "Model fusion of deep neural networks for anomaly detection," Journal of Big Data, vol. 8, no. 106, p. 19, 2021. [CrossRef] 99. M. A. Khan, "HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System," Processes, vol. 9, no. 5, 2021. [CrossRef] 100. H. Liu, B. Lang, M. Liu and H. Yan, "CNN and RNN based payload classification methods for attack detection," Knowledge-Based Systems, vol. 163, pp. 332-341, 2019. [CrossRef] 101. Y. Yang, K. Zheng, C. Wu and Y. Yang, "Improving the classification effectiveness of intrusion detection by using improved conditional variational AutoEncoder and deep neural network," Sensors, vol. 19, no. 11, p. 20, 2019. [CrossRef] 102. K. Hara and K. Shiomoto, "Intrusion Detection System using Semi-Supervised Learning with Adversarial Auto-encoder," in NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 2020. [CrossRef] 103. C. Zhang, X. Costa-Perez and P. Patras, "Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems," in CCSW'20: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, New York, NY, USA, 2020. [CrossRef] 104. L. Duong, "Optimization of Cyber-Attack Detection Using the Deep Learning Network," International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no. 7, pp. 159-168, 2021. 105. V. Prabhakaran and A. Kulandasamy, "Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection," Neural Computing and Applications, vol. 33, no. 1, 2021. [CrossRef] 106. Y. Zeng and H. W. W. &. G. Y. Gu, "Deep-Full-Range: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework," IEEE Access, vol. 7, pp. 45182-45190, 2019. [CrossRef] 107. N. Al-Taleb, N. Saqib, Atta-ur-Rahman and S. Dash, "Cyber Threat Intelligence for Secure Smart City," ArXiv Preprints, vol. abs/2007.13233, 2020. 108. T. Lu, Y. Du, L. Ouyang, Q. Chen and X. Wang, "Android Malware Detection Based on a Hybrid Deep Learning Model," Security and Communication Networks, vol. 2020, p. 11, 2020. [CrossRef] 109. L. Faling and P. Juan, "Intrusion Detection Based on CNN and WDLSTM in Big Data Environment," Journal of Southwest China Normal University, vol. 46, no. 9, pp. 103-108, 2021. 110. P. Wu and H. Guo, "LuNET: a deep neural network for network intrusion detection," in Proceedings of the Symposium Series on Computational Intelligence (SSCI), Xiamen, China, 2019. 111. C. M. Hsu, H. Y. Hsieh, S. W. Prakosa, M. Z. Azhari and J. S. Leu, "Using long-short-term memory based convolutional neural networks for network intrusion detection," in Proceedings of the International Wireless Internet Conference, Taipei, Taiwan, 2018. 112. Z. Fan and Z. Cao, "An Improved Method of Network Intrusion Discovery Based on Convolutional Long-short Term Memory Network," IEEE Access, vol. 9, p. 10, 2021. [CrossRef] 113. H. F. Calvo-Pardo, T. Mancini and J. Olmo, "Optimal Deep Neural Networks by Maximization of the Approximation Power," arXiv Preprints, p. arXiv:2010.04044v2, 2020. [CrossRef] 114. D. Yarotsky, "Optimal approximation of continuous functions by very deep ReLU networks," in Proceedings of the 31st Conference On Learning Theory, PMLR, 2018. 115. K. F. E. Chong, "A closer look at the approximation capabilities of neural networks," in 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, 2020. 116. H. Mhaskar and T. Poggio, "FUNCTION APPROXIMATION BY DEEP NETWORKS," COMMUNICATIONS ON PURE AND APPLIED ANALYSIS, vol. 19, no. 8, pp. 4085-4095, August 2020. [CrossRef] 117. M. Leshno, W. Lin, A. Pinkus and S. Schocken, "Multilayer feedforward networks with a nonpolynomial activation function can approximate any function," Neural Networks, vol. 6, no. 6, pp. 861-867, 1993. [CrossRef] 118. G. Montufar, R. Pascanu, K. Cho and Y. Bengio, "On the number of linear regions of deep neural networks," Advances in neural information processing systems, pp. 2924-2932, 2014. 119. O. Sharir and A. Shashua, "On the expressive power of overlapping architectures of deep learning," arXiv preprint, p. arXiv:1703.02065 , 2017. 120. M. Ribeiro, "Lipschitz Continuity, convexity, subgradients," 2 April 2015. [Online]. Available: https://homes.cs.washington.edu/~marcotcr/blog/lipschitz/. 121. K. Hornik, M. Stinchcombe and H. White, "Multilayer feedforward networks are universal approximators," Neural Networks, vol. 2, no. 5, pp. 359-366, 1989. [CrossRef] 122. H. N. Mhaskar, "Approximation properties of a multilayered feedforward artificial neural network," Advances in Computational Mathematics, vol. 1, no. 1, pp. 61-80, Feb 1993. [CrossRef] 123. K.-I. Funahashi, "On the approximate realization of continuous mappings by neural networks," Neural Networks, vol. 2, no. 3, pp. 183-192, 1989. [CrossRef] 124. T. Nguyen-Thien and T. Tran-Cong, "Approximation of functions and their derivatives: A neural network implementation with applications," Applied Mathematical Modelling, vol. 23, no. 9, pp. 687-704, 1999. [CrossRef] 125. R. Eldan and O. Shamir, "The power of depth for feed forward neural networks," in Proceedings of the 29th Conference on Learning Theory (COLT 2016), New York, USA, 2016. 126. M. Raghu, B. Poole, J. Kleinberg, S. Ganguli and J. Sohl-Dickstein, "On the Expressive Power ofDeep Neural Networks," in International Conference on Machine Learning(ICML2016), New York City, NY, USA, 2016. 127. R. Arora, A. Basu, P. Mianj and A. Mukherjee, "Understanding Deep Neural Networks with Rectified Linear Units," in 6th International Conference on Learning Representations (ICLR 2018), Vancouver, BC, Canada,, 2018. 128. C.-F. Wang, "The Vanishing Gradient Problem: The Problem, Its Causes, Its Significance, and Its Solutions," 8 Jan 2019. [Online]. Available: https://towardsdatascience.com/the-vanishing-gradient-problem-69bf08b15484. 129. C.-P. Lee, C. Lim and S. Wright, "A Distributed Quasi-Newton Algorithm for Empirical Risk Mini Minimization," in KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining,, London, United Kingdom, 2018. 130. A. Jung, "Machine Learning: Basic Principles," arXiv Preprints, p. arXiv:1805.05052v13, 22 October 2020. 131. S. Clémençon, A. Bellet and I. Colin, "Scaling-up Empirical Risk Minimization: Optimization of Incomplete U-statistics," Journal of Machine Learning Research, vol. 17, no. 76, pp. 1-36, 2016. [CrossRef] 132. Y. Zhou, "Nonconvex Optimization in Machine Learning: Convergence,Landscape, and Generalization," Ohio State University, 2018. 133. R. Novak, Y. Bahri, D. Abolafia, J. Pennington and J. Sohl-Dickstein, "SENSITIVITY AND GENERALIZATION IN NEURAL NETWORKS: AN EMPIRICAL STUDY," arXiv Preprints, p. arXiv:1802.08760v3, 28 June 2018. 134. P. Jain and P. Kar, "Non-convex Optimization for Machine Learning," Foundations and Trend in Machine Learning, vol. 10, no. 3-4, pp. 142-336, 2017. [CrossRef] 135. E. Mehdi, "Non-Convex Optimization in Deep Learning," 28 July 2020. [Online]. Available: https://medium.com/swlh/non-convex-optimization-in-deep-learning-26fa30a2b2b3. 136. D. Lopez-Paz and L. Sagun, "Easing Non-Convex Optimization with Neural Networks," in International Conference on Learning Representations (ICLR 2018), Vancouver, BC, Canada, 2018. 137. V. Cherkassky, "Model complexity control and statistical learning theory," Natural Computing, vol. 1, pp. 109-133, 2002. [CrossRef] 138. T. Poggio, Q. Liao and A. Banburski, "Complexity control by gradient descent in deep networks," Nature Communications, vol. 11, no. 1027, pp. 1-6, 2020. [CrossRef] [PMCID] 139. I. Marin, A. Skelin and T. Grujic, "Empirical Evaluation of the Effect of Optimization and Regularization Techniques on the Generalization Performance of Deep Convolutional Neural Network," Applied Sciences, vol. 10, no. 7817, pp. 1-30, 2020. [CrossRef] 140. D. Soydaner, "A Comparison of Optimization Algorithms for Deep Learning," International Journal of Pattern Recognition and Artificial Intelligence, vol. 34, no. 13, pp. 1-26, 28 July 2020. [CrossRef] 141. D. Kingma and J. Ba, "Adam: A method for stochastic optimization," in 3rd International Conference on Learning Representations (ICLR2015), San Diego, CA, USA, 2015. 142. Z. Tao, Q. Xia and Q. Li, "A new perspective in understanding of Adam-Type algorithms and beyond," 25 September 2019. [Online]. Available: https://openreview.net/forum?id=SyxM51BYP. [Accessed 25 March 2022]. 143. S. Reddi, M. Zaheer, D. Sachan, S. Kale and S. Kumar, "Adaptive Methods for Nonconvex Optimization," in 32nd Conference on Neural Information Processing Systems (NIPS 2018), Montréal, Canada, 2018. 144. I. Goodfellow, Y. Bengio and A. Courville, Deep Learning, MIT Press, 2016. 145. F. Ayo, S. Folorunso, A. Abayomi-Alli, A. Adekunle and J. Awotunde, "Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection," Information Security Journal: A Global Perspective, vol. 29, no. 6, pp. 267-283, 2020. [CrossRef] 146. F. Zhang and D. Wang, "An Effective Feature Selection Approach for Network Intrusion Detection," in 2013 IEEE Eighth International Conference on Networking, Architecture and Storage, Xi'an, China, 2013. [CrossRef] 147. T. Zhang, "Application and Research of Deep Neural Network Model in Computer Network Intrusion Detection," in 2019 3rd Scientific Conference on Mechatronics Engineering and Computer Science (SCMC 2019), 2019. 148. S. Kabaivanov and V. Markovska, "Hybrid deep-learning analysis for cyber anomaly detection," IOP Conference Series: Materials Science and Engineering, vol. 878, no. 012029, pp. 1-7, 2020. [CrossRef] 149. L. Wu, Z. Zhu and E. Weinan, "Towards Understanding Generalization of Deep Learning: Perspective of Loss Landscapes," arXiv preprint, p. arXiv:1706.10239, June 2017. 150. R. Sahu and S. Panigrahi, "Application of Deep Learning for Database Intrusion Detection," in Advanced Computing and Intelligent Engineering, vol. 1082, B. Pati, C. Panigrahi, R. Buyya and K. Li, Eds., Springer Nature, Singapore , 2020. [CrossRef]

Subjects

ISSN: 2319-6378 (Online)
https://portal.issn.org/resource/ISSN/2319-6378#
Retrieval Number: 100.1/ijese.F25300510622
https://www.ijese.org/portfolio-item/f25300510622/
Journal Website: www.ijese.org
https://www.ijese.org
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org