Show simple item record

dc.contributor.authorBodström, Tero
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorGalinina, Olga
dc.contributor.editorAndreev, Sergey
dc.contributor.editorBalandin, Sergey
dc.contributor.editorKoucheryavy, Yevgeni
dc.date.accessioned2018-10-29T06:34:16Z
dc.date.available2018-10-29T06:34:16Z
dc.date.issued2018
dc.identifier.citationBodström, T., & Hämäläinen, T. (2018). State of the Art Literature Review on Network Anomaly Detection with Deep Learning. In O. Galinina, S. Andreev, S. Balandin, & Y. Koucheryavy (Eds.), <i>NEW2AN 2018, ruSMART 2018 : Internet of Things, Smart Spaces, and Next Generation Networks and Systems : 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedings</i> (pp. 64-76). Springer. Lecture Notes in Computer Science, 11118. <a href="https://doi.org/10.1007/978-3-030-01168-0_7" target="_blank">https://doi.org/10.1007/978-3-030-01168-0_7</a>
dc.identifier.otherCONVID_28281437
dc.identifier.otherTUTKAID_78944
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/59976
dc.description.abstractAs network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additionally, the expected number of connected devices as well as the fast-paced development caused by the Internet of Things, raises huge risks in cyber security that must be dealt with accordingly. When considering all above-mentioned reasons, there is no doubt that there is plenty of room for more advanced methods in network anomaly detection hence Deep Learning based techniques have been proposed recently in detecting anomalies.fi
dc.format.extent705
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofNEW2AN 2018, ruSMART 2018 : Internet of Things, Smart Spaces, and Next Generation Networks and Systems : 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedings
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.rightsIn Copyright
dc.subject.othernetwork anomaly detection
dc.subject.otherdeep learning
dc.titleState of the Art Literature Review on Network Anomaly Detection with Deep Learning
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201810044356
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2018-10-04T15:15:04Z
dc.relation.isbn978-3-030-01167-3
dc.description.reviewstatuspeerReviewed
dc.format.pagerange64-76
dc.relation.issn0302-9743
dc.relation.numberinseries11118
dc.type.versionacceptedVersion
dc.rights.copyright© Springer Nature Switzerland AG 2018
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Next Generation Wired/Wireless Advanced Networks and Systems
dc.subject.ysotietoturva
dc.subject.ysoverkkohyökkäykset
dc.subject.ysokoneoppiminen
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-01168-0_7


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright