The Future Roadmap for Cyber-attack Detection

被引:1
|
作者
Soleymanzadeh, Raha [1 ]
Kashef, Rasha [1 ]
机构
[1] Ryerson Univ, Elect Comp & Biomed Engn, Toronto, ON, Canada
关键词
cyber-attack; machine learning; deep learning; NETWORK;
D O I
10.1109/CSP55486.2022.00021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks can cause delays in world operations and substantial economic losses. Therefore, there is a greater interest in cyber-attack detection (CAD) to accommodate the exponential increase in the number of attacks. Various CAD techniques have been developed, including Machine Learning (ML) and Deep Learning (DL). Despite the high accuracy of the deep learning-based method when learning from large amounts of data, the performance drops considerably when learning from imbalanced data. While many studies have been conducted on imbalanced data, the majority possess weaknesses that can lead to data loss or overfitting. However, Generative Adversarial Networks can help solve problems such as overfitting and class overlapping by generating new virtual data similar to the existing data. This paper provides a comprehensive overview of the current literature in CAD methods, thus shedding light on present research and drawing a future road map for cyber-attack detection in different applications.
引用
收藏
页码:66 / 70
页数:5
相关论文
共 50 条
  • [1] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    SENSORS, 2023, 23 (05)
  • [2] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [3] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [4] Cyber-Attack Attributes
    Kadivar, Mehdi
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [5] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [6] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [7] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [8] A Stealth Cyber-Attack Detection Strategy for DC Microgrids
    Sahoo, Subham
    Mishra, Sukumar
    Peng, Jimmy Chih-Hsien
    Dragicevic, Tomislav
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2019, 34 (08) : 8162 - 8174
  • [9] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [10] Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings
    Vidanapathirana, Dushani
    Mohammad, Azeem
    Halgamuge, Malka N.
    2022 IEEE 17TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2022, : 1423 - 1429