Publication: Deep learning based security management of information systems: A comparative study
dc.contributor.author | Çebi, Cem Berke | |
dc.contributor.author | Bulut, Fatma Sena | |
dc.contributor.author | Fırat, Hazal | |
dc.contributor.author | ŞAHİNGÖZ, ÖZGÜR KORAY | |
dc.contributor.author | BAYDOĞMUŞ, GÖZDE KARATAŞ | |
dc.contributor.authorID | 214903 | tr_TR |
dc.date.accessioned | 2020-01-03T11:16:00Z | |
dc.date.available | 2020-01-03T11:16:00Z | |
dc.date.issued | 2020-01 | |
dc.description.abstract | In recent years, there is a growing trend of internetization which is a relatively new word for our global economy that aims to connect each market sectors (or even devices) by using the global network architecture as the Internet. Although this connectivity enables great opportunities in the marketplace, it results in many security vulnerabilities for admins of the computer networks. Firewalls and Antivirus systems are preferred as the first line of a defense mechanism; they are not sufficient to protect the systems from all type of attacks. Intrusion Detection Systems (IDSs), which can train themselves and improve their knowledge base, can be used as an extra line of the defense mechanism of the network. Due to its dynamic structure, IDSs are one of the most preferred solution models to protect the networks against attacks. Traditionally, standard machine learning methods are preferred for training the system. However, in recent years, there is a growing trend to transfer these standard machine learning-based systems to the deep learning models. Therefore, in this paper, IDSs with four different deep learning models are proposed, and their performance is compared. The experimental results showed that proposed models result in very high and acceptable accuracy rates with KDD Cup 99 Dataset. | |
dc.identifier.scopus | 2-s2.0-85087916948 | |
dc.identifier.uri | https://hdl.handle.net/11413/5976 | |
dc.language.iso | en | |
dc.relation.journal | 6th International Conference on Information Management and Industrial Engineering (ICII 2020) | tr_TR |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | |
dc.subject | Cyber Security | |
dc.subject | Intrusion Detection Systems | |
dc.subject | Deep Learning | |
dc.subject | BiRNN | |
dc.subject | BİLSTM | |
dc.subject | CNN-LSTM | |
dc.subject | GRU | |
dc.subject | KDDCup99 | |
dc.title | Deep learning based security management of information systems: A comparative study | |
dc.type | conferenceObject | |
dspace.entity.type | Publication | |
local.indexed.at | Scopus | |
relation.isAuthorOfPublication | c0dcce72-7c1e-4e9b-ae5c-5f3de0540a4d | |
relation.isAuthorOfPublication | 4e820274-4a42-44ba-aced-ca58912c0424 | |
relation.isAuthorOfPublication.latestForDiscovery | c0dcce72-7c1e-4e9b-ae5c-5f3de0540a4d |
Files
License bundle
1 - 1 of 1
- Name:
- license.txt
- Size:
- 1.82 KB
- Format:
- Item-specific license agreed upon to submission
- Description: