Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Deep memory for deep threats: A novel architecture combining GRUs and deep learning models for IDS
by
Alqhatani, Abdulmajeed
, Amin, Rashid
, Mehmood, Sajid
, Asiri, Fatima
, Alshehri, Mohammed S.
, Alshehri, Asma Hassan
in
Accuracy
/ Algorithms
/ Analysis
/ Computer architecture
/ Computer Security
/ Cybersecurity
/ Cyberterrorism
/ Deep Learning
/ Denial of service attacks
/ Detectors
/ Humans
/ Internet of Things
/ Intrusion detection systems
/ Machine learning
/ Neural networks
/ Neural Networks, Computer
/ Real time
/ Turing machines
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Deep memory for deep threats: A novel architecture combining GRUs and deep learning models for IDS
by
Alqhatani, Abdulmajeed
, Amin, Rashid
, Mehmood, Sajid
, Asiri, Fatima
, Alshehri, Mohammed S.
, Alshehri, Asma Hassan
in
Accuracy
/ Algorithms
/ Analysis
/ Computer architecture
/ Computer Security
/ Cybersecurity
/ Cyberterrorism
/ Deep Learning
/ Denial of service attacks
/ Detectors
/ Humans
/ Internet of Things
/ Intrusion detection systems
/ Machine learning
/ Neural networks
/ Neural Networks, Computer
/ Real time
/ Turing machines
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Deep memory for deep threats: A novel architecture combining GRUs and deep learning models for IDS
by
Alqhatani, Abdulmajeed
, Amin, Rashid
, Mehmood, Sajid
, Asiri, Fatima
, Alshehri, Mohammed S.
, Alshehri, Asma Hassan
in
Accuracy
/ Algorithms
/ Analysis
/ Computer architecture
/ Computer Security
/ Cybersecurity
/ Cyberterrorism
/ Deep Learning
/ Denial of service attacks
/ Detectors
/ Humans
/ Internet of Things
/ Intrusion detection systems
/ Machine learning
/ Neural networks
/ Neural Networks, Computer
/ Real time
/ Turing machines
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Deep memory for deep threats: A novel architecture combining GRUs and deep learning models for IDS
Journal Article
Deep memory for deep threats: A novel architecture combining GRUs and deep learning models for IDS
2025
Request Book From Autostore
and Choose the Collection Method
Overview
The increasing volumes and sophistication of cyber threats, particularly Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks, pose significant dangers to contemporary network structures, particularly the Internet of Things (IoT) environment. Conventional Intrusion Detection Systems (IDS) are also becoming obsolete because they perform detection in a built-in manner and are unable to capture the time trends of dynamic changes of threats. To eliminate such shortcomings, a new hybrid deep learning architecture named the Neural Turing Machine-Gated Recurrent Unit (NTM-GRU) model is proposed in this paper that incorporates the external memory of NTMs and extra temporal learning power of GRUs. The architecture supports analysis on dual timescales, which in turn captures short- and long-term dependencies, exposing the model to unravel complex, low, slow, and zero-day intrusions with recall. Huge testing on the standard sets (UNSW-NB15 and BoT-IoT) and actual (CICIDS2017 and CSE-CID-IS2018 ) demonstrate the high effectiveness of the usage of the model, reaching an accuracy of 99.98%, F1-scores of up to 96% on unknown threats, and the low false positive rates (less than 0.4%). The proposed framework can be applied in both industrial settings and high-speed network settings, where the real-time inference speed was measured at 2.3 milliseconds. The model also incorporates interpretability aspects, making it suitable for Security Operation Centres (SOCs). This work, through the merger of complex memory neural-network structures with cybersecurity needs and requirements encountered in the world, can be realized as providing a scalable, adaptive, and interpretable intrusion detection module, establishing a new state-of-the-art standard for securing next-generation networks.
This website uses cookies to ensure you get the best experience on our website.