Skip to main content

Summary and Further Challenges

  • Chapter
  • First Online:
Network Intrusion Detection using Deep Learning

Abstract

This last chapter concludes this monograph by providing a closing statement regarding the advantage of using deep learning models for IDS purposes and why those models can improve IDS performance. Afterward, the overview of challenges and future research directions in deep learning applications for IDS is suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y. Wang, W.-d. Cai, and P.-c. Wei, “A deep learning approach for detecting malicious javascript code,” Security and Communication Networks, vol. 9, no. 11, pp. 1520–1534, 2016.

    Article  Google Scholar 

  2. W. Jung, S. Kim, and S. Choi, “Poster: deep learning for zero-day flash malware detection,” in 36th IEEE symposium on security and privacy, 2015.

    Google Scholar 

  3. P. Louvieris, N. Clewley, and X. Liu, “Effects-based feature identification for network intrusion detection,” Neurocomputing, vol. 121, pp. 265–273, 2013.

    Article  Google Scholar 

  4. F. Palmieri, U. Fiore, and A. Castiglione, “A distributed approach to network anomaly detection based on independent component analysis,” Concurrency and Computation: Practice and Experience, vol. 26, no. 5, pp. 1113–1129, 2014.

    Article  Google Scholar 

  5. M. K. Putchala, “Deep learning approach for intrusion detection system (ids) in the internet of things (iot) network using gated recurrent neural networks (gru),” Ph.D. dissertation, Wright State University, 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kim, K., Aminanto, M.E., Tanuwidjaja, H.C. (2018). Summary and Further Challenges. In: Network Intrusion Detection using Deep Learning. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1444-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1444-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1443-8

  • Online ISBN: 978-981-13-1444-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics