The Future Roadmap for Cyber-attack Detection

被引:1
|
作者
Soleymanzadeh, Raha [1 ]
Kashef, Rasha [1 ]
机构
[1] Ryerson Univ, Elect Comp & Biomed Engn, Toronto, ON, Canada
关键词
cyber-attack; machine learning; deep learning; NETWORK;
D O I
10.1109/CSP55486.2022.00021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks can cause delays in world operations and substantial economic losses. Therefore, there is a greater interest in cyber-attack detection (CAD) to accommodate the exponential increase in the number of attacks. Various CAD techniques have been developed, including Machine Learning (ML) and Deep Learning (DL). Despite the high accuracy of the deep learning-based method when learning from large amounts of data, the performance drops considerably when learning from imbalanced data. While many studies have been conducted on imbalanced data, the majority possess weaknesses that can lead to data loss or overfitting. However, Generative Adversarial Networks can help solve problems such as overfitting and class overlapping by generating new virtual data similar to the existing data. This paper provides a comprehensive overview of the current literature in CAD methods, thus shedding light on present research and drawing a future road map for cyber-attack detection in different applications.
引用
收藏
页码:66 / 70
页数:5
相关论文
共 50 条
  • [31] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400
  • [32] Cyber-attack Detection Strategy Based on Distribution System State Estimation
    Huan Long
    Zhi Wu
    Chen Fang
    Wei Gu
    Xinchi Wei
    Huiyu Zhan
    Journal of Modern Power Systems and Clean Energy, 2020, 8 (04) : 669 - 678
  • [33] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [34] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [35] Cyber-attack, a clear and present danger
    不详
    NEW SCIENTIST, 2009, 201 (2699) : 18 - 19
  • [36] ARTT Taxonomy and Cyber-attack Framewok
    Douad, Mohamed Amine
    Dahmani, Youcef
    2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [37] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Polatidis, Nikolaos
    Pimenidis, Elias
    Pavlidis, Michalis
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    EVOLVING SYSTEMS, 2020, 11 (03) : 479 - 490
  • [38] A model predictive approach for cyber-attack detection and mitigation in control systems
    Rosich, Albert
    Voos, Holger
    Li, Yumei
    Darouach, Mohamed
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 6621 - 6626
  • [39] A robust intelligent zero-day cyber-attack detection technique
    Kumar, Vikash
    Sinha, Ditipriya
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2211 - 2234
  • [40] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Nikolaos Polatidis
    Elias Pimenidis
    Michalis Pavlidis
    Spyridon Papastergiou
    Haralambos Mouratidis
    Evolving Systems, 2020, 11 : 479 - 490