Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Deep Learning for Intrusion Detection (eBook)

Techniques and Applications
eBook Download: EPUB
2025
502 Seiten
Wiley (Verlag)
978-1-394-28517-4 (ISBN)

Lese- und Medienproben

Deep Learning for Intrusion Detection -
Systemvoraussetzungen
116,99 inkl. MwSt
(CHF 114,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Comprehensive resource exploring deep learning techniques for intrusion detection in various applications such as cyber physical systems and IoT networks

Deep Learning for Intrusion Detection provides a practical guide to understand the challenges of intrusion detection in various application areas and how deep learning can be applied to address those challenges. It begins by discussing the basic concepts of intrusion detection systems (IDS) and various deep learning techniques such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and deep belief networks (DBNs). Later chapters cover timely topics including network communication between vehicles and unmanned aerial vehicles. The book closes by discussing security and intrusion issues associated with lightweight IoTs, MQTT networks, and Zero-Day attacks.

The book presents real-world examples and case studies to highlight practical applications, along with contributions from leading experts who bring rich experience in both theory and practice.

Deep Learning for Intrusion Detection includes information on:

  • Types of datasets commonly used in intrusion detection research including network traffic datasets, system call datasets, and simulated datasets
  • The importance of feature extraction and selection in improving the accuracy and efficiency of intrusion detection systems
  • Security challenges associated with cloud computing, including unauthorized access, data loss, and other malicious activities
  • Mobile Adhoc Networks (MANETs) and their significant security concerns due to high mobility and the absence of a centralized authority

Deep Learning for Intrusion Detection is an excellent reference on the subject for computer science researchers, practitioners, and students as well as engineers and professionals working in cybersecurity.

FAHEEM SYEED MASOODI, PHD, is an Associate Professor of Cybersecurity at Bahrain Polytechnic University. He previously served at the University of Kashmir and the Jazan University in Saudi Arabia. He holds a PhD in Network Security and Cryptography and has published extensively in cryptography, intrusion detection, post-quantum cryptography, financial security, and IoT. His contributions include several books, high-impact papers, and fellowships from France, Brazil, India, and Malaysia.

ALWI BAMHDI, PHD, is an Associate Professor in the Computer Sciences Department at Umm ul Qura University, Saudi Arabia. His research interests include mobile ad hoc networks, wireless sensor networks, and information security.

1
Intrusion Detection in the Age of Deep Learning: An Introduction


Faheem Syeed Masoodi

School of ICT, Bahrain Polytechnic, Isa Town, Kingdom of Bahrain

1.1 Introduction


The exponential growth of mobile-driven internet traffic is closely tied to the evolving demands of society, particularly with the increased mobility of applications such as e-learning, e-banking, and e-health. This surge in internet usage has created a dynamic landscape where over 55% of website traffic globally originates from mobile devices, and a staggering 92.3% of internet users access the internet using mobile phones. This transformative shift, as of November 2023, reflects a substantial increase from levels as low as 6.1% (less than one-third) in 2011 and 37.2% in 2015 [1].

However, this surge in mobile connectivity is accompanied by a corresponding rise in cybersecurity threats. The widespread use of Internet of Things (IoT) devices has intensified the prevalence of cyberattacks. According to the Mobile and Wireless Communications Enablers for the Twenty-Twenty Information Society (METIS) report, common threats include brute-force attacks, malvertising, phishing, SQL injection, Distributed Denial of Service (DDoS) attacks, and malware. Notably, ransomware constitutes a significant portion of malware, accounting for 85% of observed instances in a given year [2].

As the world becomes increasingly reliant on internet connectivity for various aspects of daily life, the parallel increase in cybersecurity threats highlights the need for robust security measures to safeguard sensitive data and ensure the uninterrupted operation of essential services. This dual trend emphasizes the importance of addressing both the opportunities and challenges presented by the evolution of internet usage.

In this context, the integration of effective intrusion detection mechanisms becomes crucial for maintaining the security and resilience of digital ecosystems. The continual evolution of intrusion detection technology is vital to staying one step ahead of the evolving threat landscape and ensuring the ongoing safety of internet interactions [3]. Before the advent of sophisticated intrusion detection systems (IDSs), network security relied on a patchwork of conventional measures that provided a degree of protection but were fraught with limitations [4]. To understand the significance of IDSs, we must first delve into the challenges posed by earlier security practices and the compelling reasons that drove the evolution of network security [5].

1.1.1 The Pioneers of Network Security


Before IDSs, several traditional security approaches were employed to safeguard networks and systems:

  1. Firewalls: Firewalls acted as the initial line of defense by filtering outgoing and incoming traffic based on predefined rules. While effective at blocking unauthorized access by controlling ports and IP addresses, they were static and lacked the agility to detect complex attacks.
  2. Antivirus Software: Antivirus programs were our trusted guardians against known malware threats. However, they struggled when confronted with new, previously unseen viruses and could not identify sophisticated, behavior-based attacks.
  3. Access Control Lists (ACLs): Access control lists governed user access to network resources. Though vital for user management, they could not actively detect threats or unusual activities within the network.
  4. Security Policies: Organizations established comprehensive security policies, outlining best practices and guidelines. While important, these policies could not actively monitor the network for threats or deviations from normal behavior.

1.1.1.1 Limitations of the Existing System

Despite their significance, these conventional security measures revealed glaring limitations:

  • Blind to the Unknown: They excelled at countering known threats but remained oblivious to the emerging, novel attacks known as “zero-day” threats. This made them reactive, not proactive.
  • Lack of Behavioral Analysis: Traditional security practices relied on predefined rules and signatures, missing the capacity to analyze network and user behavior. They could not identify deviations from normal patterns.
  • Limited Visibility: With a focus on perimeter security, they had a restricted view of internal network activities. Attacks originating from within often went undetected.
  • False Alarms and Missed Threats: These measures frequently produced false alarms, diverting attention away from real threats. Simultaneously, they missed subtle yet malicious activities, creating a trust deficit in security alerts.
  • Evolving Attack Techniques: Cybercriminals were quick to adapt, employing advanced tactics such as polymorphic malware and evasion strategies that circumvented static security defenses.

It was against this backdrop of limitations and ever-evolving threats that IDSs emerged as a game-changer. IDSs introduced dynamic, behavior-based analysis, actively monitoring network traffic and system activities. They could identify anomalies, generate real-time alerts, and even take preventive actions.

As we journey through the world of IDSs, we will explore their various types, techniques, and their pivotal role in fortifying our digital landscapes against an ever-growing spectrum of threats. The story of IDS is not just a narrative of technological progress but also a testament to our unwavering commitment to securing the digital domain.

1.1.2 How Firewalls Are Different from IDS


Firewalls are primarily created to serve as a protective barrier or gatekeeper separating a secure internal network from potentially insecure external networks, such as the internet [1]. They enforce access control policies and decide which network traffic is allowed or blocked based on predefined rules. Firewalls are focused on preventing unauthorized access and traffic filtering. IDSs, on the other hand, are designed to monitor network traffic and system activities for signs of suspicious or malicious behavior. IDSs are intended for detection and notification of potential security threats or intrusions rather than actively blocking traffic. IDSs are valuable for detecting unknown or zero-day threats because they can identify unusual patterns or anomalies in network traffic by performing deep inspection of packets. Firewalls rely on predefined rules, so they may not detect new and evolving threats effectively. IDSs offer comprehensive data on security events and occurrences, encompassing details about the intrusion's characteristics, the IP addresses of both the source and target, the tactics employed, and additional information. This information is crucial for incident response and forensic analysis. Firewalls typically provide limited information beyond whether a connection was allowed or blocked. For comprehensive network security, it is advisable to use both firewalls and IDSs. Firewalls establish the first line of defense by controlling traffic and blocking known threats, while the IDS provides a second layer of defense by monitoring for unusual or suspicious activities that may bypass the firewall.

In summary, IDSs and firewalls have distinct roles in network security. Firewalls are primarily focused on access control and traffic filtering and cannot detect advanced attacks like Denial of Service (DoS), while IDSs are focused on monitoring and detecting potential advanced intrusions and security threats. To achieve a robust and layered security posture, organizations often deploy both IDSs and firewalls to provide proactive prevention and effective detection and response capabilities.

1.1.3 Need for Intrusion Detection Systems


When a private network or a system is connected to the internet, it becomes vulnerable to certain attacks and must be protected from such attacks. Any attempt that aims to get unauthorized access to the system resources and information that creates threat to confidentiality, integrity, availability, and authentication is called intrusion [2]. The private network or system's ability to process, transfer, and store information has more value than the computer system it operates on. The network carries secret information, e.g., financial and personal data. It is desirable to protect the information transmission from an opponent and it becomes necessary to provide enough security to the system resources. Intrusion detection plays an important role in detecting the intrusions and preserving the security services. The security services are the actions taken by the security mechanism to provide sufficient security to the system and data transfers [3]. The goals of the security mechanism are to understand the attacks clearly and to find adequate solutions to tackle such problems. The four main principles of network security services are as follows:

  • Confidentiality: Ensures that only authorized parties with sufficient privileges may view the sensitive and secret information. The transmitted data must be meaningless during the transmission and should be meaningful only to the intended user.
  • Authentication: Authentication is a process of verifying the identity of the user, which assures the communication party, is one as it claimed. It ensures that the origin of the message or host is correctly identified.
  • Integrity: Ensures that the data received is correct and no unauthorized person or malicious software has...

Erscheint lt. Verlag 14.11.2025
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Schlagworte Anomaly Detection • Cloud Security • Cyber Physical Systems • cybersecurity deep learning • cybersecurity IoT • Intrusion Detection Systems • IoMT • MANETs • mobile adhoc networks • MQTT networks • Network Security • Zero-day Attacks
ISBN-10 1-394-28517-5 / 1394285175
ISBN-13 978-1-394-28517-4 / 9781394285174
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Auto der Zukunft – Vernetzt und autonom fahren

von Roman Mildner; Thomas Ziller; Franco Baiocchi

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 37,10