Abstract
This last chapter concludes this monograph by providing a closing statement regarding the advantage of using deep learning models for IDS purposes and why those models can improve IDS performance. Afterward, the overview of challenges and future research directions in deep learning applications for IDS is suggested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Y. Wang, W.-d. Cai, and P.-c. Wei, “A deep learning approach for detecting malicious javascript code,” Security and Communication Networks, vol. 9, no. 11, pp. 1520–1534, 2016.
W. Jung, S. Kim, and S. Choi, “Poster: deep learning for zero-day flash malware detection,” in 36th IEEE symposium on security and privacy, 2015.
P. Louvieris, N. Clewley, and X. Liu, “Effects-based feature identification for network intrusion detection,” Neurocomputing, vol. 121, pp. 265–273, 2013.
F. Palmieri, U. Fiore, and A. Castiglione, “A distributed approach to network anomaly detection based on independent component analysis,” Concurrency and Computation: Practice and Experience, vol. 26, no. 5, pp. 1113–1129, 2014.
M. K. Putchala, “Deep learning approach for intrusion detection system (ids) in the internet of things (iot) network using gated recurrent neural networks (gru),” Ph.D. dissertation, Wright State University, 2017.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature
About this chapter
Cite this chapter
Kim, K., Aminanto, M.E., Tanuwidjaja, H.C. (2018). Summary and Further Challenges. In: Network Intrusion Detection using Deep Learning. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1444-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-1444-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1443-8
Online ISBN: 978-981-13-1444-5
eBook Packages: Computer ScienceComputer Science (R0)