Deep Learning: An Essential Guide to Deep Learning for Beginners Who Want to Understand How Deep Neural Networks Work and Relate to Machine Learning and Artificial Intelligence by Jones Herbert
Author:Jones, Herbert [Jones, Herbert]
Language: eng
Format: epub
Published: 2018-09-27T16:00:00+00:00
Computer systems intrusion detection
In sci-fi books such as William Gibson’s Neuromancer , hackers plug into the internet via a literal plug inserted into the base of the skull and jockey the software around; intrusion detection is done by an AI called Black Ice that guards proprietary cyberspace and tries to fry the hackers’ brains. Hackers and intrusion detection exist right now in a much more prosaic manner, but neural networks promise that at least that latter part is about to become much more interesting.
“Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection” [35] investigates the rising threat of intelligent malware and hacking attacks that might jeopardize banking systems, power grids or hospital record databases. It’s not just that everything is networked, but the sheer size of such networks makes updating a nightmare and increases their attack surface, leaving them exposed to any hacker with an opportunity; it’s as easy as walking to one of these terminals connected to the intranet , the internal network, and popping in an infected USB. It’s probably how WannaCry ransomware hit 16 UK hospitals in May 2017, locking all medical files behind a paywall and threatening deletion unless $300 in ransom was paid in Bitcoin [36] .
This research paper shows a scalable, lightweight way to keep huge networks secure, regardless of whether their components are updated or not, by using neural networks that sift through a massive volume of data to anticipate intruder behavior and deny them access. We know from other scientific areas that neural networks can achieve near-human performance in cases of person recognition and 3D object reconstruction, so it’s of great interest to find a sustainable, cheap alternative to antivirus programs and outdated control access routines that cause endless grief to support staff, such as usernames and passwords.
The neural network assigned to network security does data preprocessing to remove outliers, feature extraction to find commonalities between users, and classification to distinguish between benign and malign users. In general, intrusions come as: probing that scouts the target network for weaknesses and open ports; denial-of-service, which serves to incapacitate target network and estimate its capabilities; user-to-root that is meant to gain root access; and root-to-local that is meant to perform operations on a local machine after root access has been gained.
Neural network was first trained using 125,973 samples belonging to any of the four intrusion categories and tested with another 22,544 samples, resulting in an accuracy of 77.13% for probing attacks, 97.08% for denial-of-service, 87.10% for user-to-root but only 11.74% for root-to-local. These numbers imply that all security measures should focus on preventing access to root systems, which are those that can issue commands to subordinate machines, including the entire network or individual terminals; once the root has been hijacked, every compromised machine, or even the entire network, is decisively in the hands of the attacker, as seen with WannaCry ransomware.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Computer Vision & Pattern Recognition | Expert Systems |
Intelligence & Semantics | Machine Theory |
Natural Language Processing | Neural Networks |
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8293)
Test-Driven Development with Java by Alan Mellor(6669)
Data Augmentation with Python by Duc Haba(6573)
Principles of Data Fabric by Sonia Mezzetta(6335)
Learn Blender Simulations the Right Way by Stephen Pearson(6222)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6093)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5806)
RPA Solution Architect's Handbook by Sachin Sahgal(5488)
Big Data Analysis with Python by Ivan Marin(5333)
The Infinite Retina by Robert Scoble Irena Cronin(5188)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5140)
Pretrain Vision and Large Language Models in Python by Emily Webber(4294)
Infrastructure as Code for Beginners by Russ McKendrick(4055)
Functional Programming in JavaScript by Mantyla Dan(4037)
The Age of Surveillance Capitalism by Shoshana Zuboff(3943)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3769)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3572)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3547)
