A Survey of Deep Learning Methods for Cyber Security

被引:252
|
作者
Berman, Daniel S. [1 ]
Buczak, Anna L. [1 ]
Chavis, Jeffrey S. [1 ]
Corbett, Cherita L. [1 ]
机构
[1] JHU, Appl Phys Lab, APL1, Laurel, MD 20910 USA
关键词
cyber analytics; deep learning; deep neural networks; deep autoencoders; deep belief networks; restricted Boltzmann machines; convolutional neural networks; ANDROID MALWARE CHARACTERIZATION; NETWORK INTRUSION DETECTION; ATTACK DETECTION; BELIEF NETWORKS; NEURAL-NETWORKS; REPRESENTATIONS; CLASSIFICATION; INTERNET;
D O I
10.3390/info10040122
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural networks, generative adversarial networks, and several others. Then we discuss how each of the DL methods is used for security applications. We cover a broad array of attack types including malware, spam, insider threats, network intrusions, false data injection, and malicious domain names used by botnets.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [22] A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems
    Gaba, Shivani
    Budhiraja, Ishan
    Kumar, Vimal
    Martha, Sheshikala
    Khurmi, Jebreel
    Singh, Akansha
    Singh, Krishna Kant
    Askar, S. S.
    Abouhawwash, Mohamed
    [J]. IEEE ACCESS, 2024, 12 : 6017 - 6035
  • [23] Analysis of Machine Learning and Deep Learning in Cyber-Physical System Security
    Ankita
    Zaguia, Atef
    Rani, Shalli
    Bashir, Ali Kashif
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 355 - 363
  • [24] A survey on security of UAV and deep reinforcement learning
    Sarikaya, Burcu Sonmez
    Bahtiyar, Serif
    [J]. AD HOC NETWORKS, 2024, 164
  • [25] Privacy and Security Issues in Deep Learning: A Survey
    Liu, Ximeng
    Xie, Lehui
    Wang, Yaopeng
    Zou, Jian
    Xiong, Jinbo
    Ying, Zuobin
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2021, 9 : 4566 - 4593
  • [26] A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
    Yan, Senming
    Ren, Jing
    Wang, Wei
    Sun, Limin
    Zhang, Wei
    Yu, Quan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 467 - 496
  • [27] A Survey of Botnet in Cyber Security
    Shetu, Syeda Farjana
    Saifuzzaman, Mohd.
    Moon, Nazmun Nessa
    Nur, Fernaz Narin
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 174 - 177
  • [28] Survey on Cyber Security of CAV
    He, Qiyi
    Meng, Xiaolin
    Qu, Rong
    [J]. 2017 FORUM ON COOPERATIVE POSITIONING AND SERVICE (CPGPS), 2017, : 351 - 354
  • [29] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    [J]. Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [30] Evaluating Explanation Methods for Deep Learning in Security
    Warnecke, Alexander
    Arp, Daniel
    Wressnegger, Christian
    Rieck, Konrad
    [J]. 2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 158 - 174