Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review

04/19/2023
by   Hamza Kheddar, et al.
0

Globally, the external Internet is increasingly being connected to the contemporary industrial control system. As a result, there is an immediate need to protect the network from several threats. The key infrastructure of industrial activity may be protected from harm by using an intrusion detection system (IDS), a preventive measure mechanism, to recognize new kinds of dangerous threats and hostile activities. The most recent artificial intelligence (AI) techniques used to create IDS in many kinds of industrial control networks are examined in this study, with a particular emphasis on IDS-based deep transfer learning (DTL). This latter can be seen as a type of information fusion that merge, and/or adapt knowledge from multiple domains to enhance the performance of the target task, particularly when the labeled data in the target domain is scarce. Publications issued after 2015 were taken into account. These selected publications were divided into three categories: DTL-only and IDS-only are involved in the introduction and background, and DTL-based IDS papers are involved in the core papers of this review. Researchers will be able to have a better grasp of the current state of DTL approaches used in IDS in many different types of networks by reading this review paper. Other useful information, such as the datasets used, the sort of DTL employed, the pre-trained network, IDS techniques, the evaluation metrics including accuracy/F-score and false alarm rate (FAR), and the improvement gained, were also covered. The algorithms, and methods used in several studies, or illustrate deeply and clearly the principle in any DTL-based IDS subcategory are presented to the reader.

READ FULL TEXT

page 4

page 5

page 6

page 19

page 24

page 27

research
01/04/2021

Towards Network Traffic Monitoring Using Deep Transfer Learning

Network traffic is growing at an outpaced speed globally. The modern net...
research
05/17/2021

A Review of Intrusion Detection Systems and Their Evaluation in the IoT

Intrusion Detection Systems (IDS) are key components for securing critic...
research
11/08/2017

Privacy Preservation Intrusion Detection Technique for SCADA Systems

Supervisory Control and Data Acquisition (SCADA) systems face the absenc...
research
05/30/2013

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

The use of artificial immune systems in intrusion detection is an appeal...
research
04/11/2022

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Security concerns for IoT applications have been alarming because of the...
research
03/14/2022

Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity

This paper examines the current state of the science underlying cybersec...

Please sign up or login with your details

Forgot password? Click here to reset