Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

被引:1
|
作者
Torre, Damiano [1 ]
Mesadieu, Frantzy [1 ]
Chennamaneni, Anitha [1 ]
机构
[1] Texas A&M Univ Cent Texas, Dept Comp Informat Syst, 1001 Leadership Pl, Killeen, TX 76549 USA
关键词
Deep learning; Cybersecurity; Systematic mapping study; Systematic review; NETWORK INTRUSION DETECTION; ANOMALY DETECTION; CYBER-SECURITY; FRAMEWORK; IDENTIFICATION; AUTOENCODER; STRATEGY; SVM;
D O I
10.1007/s10664-023-10302-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextRecent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.ObjectiveTo deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.MethodWe conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.ResultsFrom an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.ConclusionsWe provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.
引用
收藏
页数:71
相关论文
共 50 条
  • [1] Deep learning techniques to detect cybersecurity attacks: a systematic mapping study
    Damiano Torre
    Frantzy Mesadieu
    Anitha Chennamaneni
    [J]. Empirical Software Engineering, 2023, 28
  • [2] Cybersecurity in Deep Learning Techniques: Detecting Network Attacks
    Ghazal, Shatha Fawaz
    Mjlae, Salameh A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 221 - 230
  • [3] Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity
    Aldhyani, Theyazn H. H.
    Alkahtani, Hasan
    [J]. SENSORS, 2022, 22 (01)
  • [4] A Deep Learning Methodology for Predicting Cybersecurity Attacks on the Internet of Things
    Alkhudaydi, Omar Azib
    Krichen, Moez
    Alghamdi, Ans D.
    [J]. INFORMATION, 2023, 14 (10)
  • [5] Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
    Zhou, Shuai
    Liu, Chi
    Ye, Dayong
    Zhu, Tianqing
    Zhou, Wanlei
    Yu, Philip S.
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (08)
  • [6] Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study
    Barik, Kousik
    Misra, Sanjay
    Konar, Karabi
    Fernandez-Sanz, Luis
    Murat, Koyuncu
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [7] A Study of Machine Learning Techniques for Cybersecurity
    Cao Tien Thanh
    [J]. 2021 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP 2021), 2021, : 54 - 61
  • [8] A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks
    Rodriguez, Eva
    Otero, Beatriz
    Gutierrez, Norma
    Canal, Ramon
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1920 - 1955
  • [9] The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review
    Mijwil M.M.
    Salem I.E.
    Ismaeel M.M.
    [J]. Iraqi Journal for Computer Science and Mathematics, 2023, 4 (01): : 87 - 101
  • [10] Improved LSTM-Based Anomaly Detection Model with Cybertwin Deep Learning to Detect Cutting-Edge Cybersecurity Attacks
    Sengan, Sudhakar
    Mehbodniya, Abolfazl
    Webber, Julian L.
    Bostani, Ali
    Almusharraf, Ahlam
    Alharbi, Meshal
    Alqahtani, Ali
    Khan, Surbhi Bhatia
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13