A survey of large language models for cyber threat detection☆

被引:10
|
作者
Chen, Yiren [1 ,2 ]
Cui, Mengjiao [1 ,2 ]
Wang, Ding [1 ,2 ]
Cao, Yiyang [1 ,2 ]
Yang, Peian [1 ,2 ]
Jiang, Bo [1 ,2 ]
Lu, Zhigang [1 ,2 ]
Liu, Baoxu [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Large language models; Cyber security; Threat detection; Literature review;
D O I
10.1016/j.cose.2024.104016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing complexity of cyber threats and the expanding scope of cyberspace, there exist progressively more challenges in cyber threat detection. It is proven that most previous threat detection models may become inadequate due to the escalation of hacker attacks. However, recent research has shown that some of these problems can be effectively addressed by Large Language Models (LLMs) directly or indirectly. Nowadays, a growing number of security researchers are adopting LLMs for analyzing various cyber threats. According to the investigation, we found that while there are numerous emerging reviews on the utilization of LLMs in some fields of cyber security, there is currently a lack of a comprehensive review on the application of LLMs in the threat detection stage. Through retrieving and collating existing works in recent years, we examined various threat detection and monitoring tasks for which LLMs may be well-suited, including cyber threat intelligence, phishing email detection, threat prediction, logs analysis, and so on. Additionally, the review explored the specific stages of different detection tasks in which LLMs are involved, evaluating the points at which LLMs are optimized. For instance, LLMs have been found to enhance the interpretability of log analysis in real-time anomaly event discovery. Additionally, we discussed some tasks where LLMs may not be suitable and explored future directions and challenges in this field. By providing a detailed status update and comprehensive insights, this review aims to assist security researchers in leveraging LLMs to enhance existing detection frameworks or develop domain-specific LLMs.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation
    Sultana, Madeena
    Taylor, Adrian
    Li, Li
    Majumdar, Suryadipta
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [22] A Model of APT Attack Defense Based on Cyber Threat Detection
    Li, Yue
    Zhang, Teng
    Li, Xue
    Li, Ting
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135
  • [23] Large language models for generative information extraction: a survey
    Xu, Derong
    Chen, Wei
    Peng, Wenjun
    Zhang, Chao
    Xu, Tong
    Zhao, Xiangyu
    Wu, Xian
    Zheng, Yefeng
    Wang, Yang
    Chen, Enhong
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (06)
  • [24] Security and Privacy Challenges of Large Language Models: A Survey
    Das, Badhan chandra
    Amini, M. hadi
    Wu, Yanzhao
    ACM COMPUTING SURVEYS, 2025, 57 (06)
  • [25] A survey on integration of large language models with intelligent robots
    Kim, Yeseung
    Kim, Dohyun
    Choi, Jieun
    Park, Jisang
    Oh, Nayoung
    Park, Daehyung
    INTELLIGENT SERVICE ROBOTICS, 2024, 17 (05) : 1091 - 1107
  • [26] Large language models: a survey of their development, capabilities, and applications
    Annepaka, Yadagiri
    Pakray, Partha
    KNOWLEDGE AND INFORMATION SYSTEMS, 2025, 67 (03) : 2967 - 3022
  • [27] A Survey of Text Watermarking in the Era of Large Language Models
    Liu, Aiwei
    Pan, Leyi
    Lu, Yijian
    Li, Jingjing
    Hu, Xuming
    Zhang, Xi
    Wen, Lijie
    King, Irwin
    Xiong, Hui
    Yu, Philip
    ACM COMPUTING SURVEYS, 2025, 57 (02)
  • [28] Survey on AI-Generated Plagiarism Detection: The Impact of Large Language Models on Academic Integrity
    Pudasaini, Shushanta
    Miralles-Pechuan, Luis
    Lillis, David
    Llorens Salvador, Marisa
    JOURNAL OF ACADEMIC ETHICS, 2024,
  • [29] Large language models for cyber resilience: A comprehensive review, challenges, and future perspectives
    Ding, Weiping
    Abdel-Basset, Mohamed
    Ali, Ahmed M.
    Moustafa, Nour
    APPLIED SOFT COMPUTING, 2025, 170
  • [30] BYOD Cyber Threat Detection and Protection Model
    Ali, Md Iman
    Kaur, Sukhkirandeep
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 211 - 218