Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

被引:1
|
作者
Torre, Damiano [1 ]
Mesadieu, Frantzy [1 ]
Chennamaneni, Anitha [1 ]
机构
[1] Texas A&M Univ Cent Texas, Dept Comp Informat Syst, 1001 Leadership Pl, Killeen, TX 76549 USA
关键词
Deep learning; Cybersecurity; Systematic mapping study; Systematic review; NETWORK INTRUSION DETECTION; ANOMALY DETECTION; CYBER-SECURITY; FRAMEWORK; IDENTIFICATION; AUTOENCODER; STRATEGY; SVM;
D O I
10.1007/s10664-023-10302-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextRecent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.ObjectiveTo deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.MethodWe conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.ResultsFrom an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.ConclusionsWe provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.
引用
收藏
页数:71
相关论文
共 50 条
  • [41] A systematic mapping study of source code representation for deep learning in software engineering
    Samoaa, Hazem Peter
    Bayram, Firas
    Salza, Pasquale
    Leitner, Philipp
    [J]. IET SOFTWARE, 2022, 16 (04) : 351 - 385
  • [42] Machine Learning and Deep Learning Methods for Cybersecurity
    Xin, Yang
    Kong, Lingshuang
    Liu, Zhi
    Chen, Yuling
    Li, Yanmiao
    Zhu, Hongliang
    Gao, Mingcheng
    Hou, Haixia
    Wang, Chunhua
    [J]. IEEE ACCESS, 2018, 6 : 35365 - 35381
  • [43] GIS Mapping and Spatial Analysis of Cybersecurity Attacks on a Florida University
    Hu, Zhiyong
    Baynard, Chris W.
    Hu, Hongda
    Fazio, Michael
    [J]. 2015 23RD INTERNATIONAL CONFERENCE ON GEOINFORMATICS, 2015,
  • [44] Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
    Wiafe, Isaac
    Koranteng, Felix Nti
    Obeng, Emmanuel Nyarko
    Assyne, Nana
    Wiafe, Abigail
    Gulliver, Stephen R.
    [J]. IEEE ACCESS, 2020, 8 : 146598 - 146612
  • [45] Cybersecurity in Smart Grids: Detecting False Data Injection Attacks Utilizing Supervised Machine Learning Techniques
    Shees, Anwer
    Tariq, Mohd
    Sarwat, Arif I.
    [J]. Energies, 2024, 17 (23)
  • [46] Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey
    Wu, Yirui
    Wei, Dabao
    Feng, Jun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [47] PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs
    Khalafalla, Mahmoud
    Gebotys, Catherine
    [J]. 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 204 - 209
  • [48] Supervised Learning to Detect DDoS Attacks
    Balkanli, Eray
    Alves, Jander
    Zincir-Heywood, A. Nur
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2014, : 50 - 57
  • [49] Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
    Khaleel, Yahya Layth
    Habeeb, Mustafa Abdulfattah
    Albahri, A. S.
    Al-Quraishi, Tahsien
    Albahri, O. S.
    Alamoodi, A. H.
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2024, 33 (01)
  • [50] Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity
    Pawlicki, Marek
    Pawlicka, Aleksandra
    Kozik, Rafal
    Choras, Michal
    [J]. NEUROCOMPUTING, 2024, 590