Large language models for cyber resilience: A comprehensive review, challenges, and future perspectives

被引:0
作者
Ding, Weiping [1 ,2 ]
Abdel-Basset, Mohamed [3 ]
Ali, Ahmed M. [3 ]
Moustafa, Nour [4 ]
机构
[1] Nantong Univ, Sch Artificial Intelligence & Comp Sci, Nantong 226019, Peoples R China
[2] City Univ Macau, Fac Data Sci, Taipa 999078, Macau, Peoples R China
[3] Zagazig Univ, Fac Comp & Informat, Dept Comp Sci, Zagazig 44519, Egypt
[4] Univ New South Wales ADFA, Sch Syst & Comp, Canberra, ACT 2612, Australia
关键词
Large Language Model; Cyber Resilience; Cyber Security; Data Privacy and Protection; Network and Endpoint Security; SECURITY; AUTOMATION; ATTACKS; DESIGN;
D O I
10.1016/j.asoc.2024.112663
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Interconnect cyber system is used by various users and organizations worldwide to perform different activities. These activities are combined with digital information and systems around the organizations to obtain higher accuracy and performance. However, these combinations of activities have faced cyber threats and attacks by single or multiple attackers. So, protecting and saving users' and organizations' sensitive data is a big challenge. So, the cyber resilience concept refers to the ability to prepare, absorb, recover, and adapt against cyberattacks and threats. It is used to mitigate cyberattacks and risks by the ability of the system to recover from threats. Artificial intelligence models enhance cyber resilience using machine learning and deep learning models. One of the most common components of artificial intelligence is large language models (LLM). It is used to understand language from text data and extract features to predict future words or missing in text datasets. LLM can enhance cyber resilience by providing various benefits for users and organizations. We divide the cyber resilience strategies into five parts. We review the LLM in each part, including security posture, data privacy and protection, security awareness, network security, and security automation. The fundamentals of LLMs are introduced as pretrained models, transformers, encoders, and decoders. Then, we review the challenges of LLM in cyber resilience and cyber defense methods to overcome these challenges. We applied the LLM into three case studies including two for email spam text classifications and one for cyber threat detection. We obtained higher accuracy including 96.67 %, 90.70 %, and 89.94 % from three case studies respectively. Then we compared our LLM with other traditional machine learning models. The results show the LLM has higher accuracy, precision, recall, and f1 score compared with other models. Finally, the future directions of LLM in cyber resilience are provided.
引用
收藏
页数:29
相关论文
共 254 条
[1]  
Abbasian M, 2024, Arxiv, DOI arXiv:2310.02374
[2]  
Ablikim M, 2023, J HIGH ENERGY PHYS, DOI 10.1007/JHEP03(2023)121
[3]   Direct measurement of the branching fraction for D+→(K)over-bar0 μ+νμ and determination of Γ(D0→K-μ+ νμ)/Γ (D+→(K)over-bar0 μ+ νμ) [J].
Ablikim, M. ;
Bai, J. Z. ;
Ban, Y. ;
Cai, X. ;
Chen, H. F. ;
Chen, H. S. ;
Chen, H. X. ;
Chen, J. C. ;
Chen, Jin ;
Chen, Y. B. ;
Chu, Y. P. ;
Dai, Y. S. ;
Diao, L. Y. ;
Deng, Z. Y. ;
Dong, Q. F. ;
Du, S. X. ;
Fang, J. ;
Fang, S. S. ;
Fu, C. D. ;
Gao, C. S. ;
Gao, Y. N. ;
Gu, S. D. ;
Gu, Y. T. ;
Guo, Y. N. ;
He, K. L. ;
He, M. ;
Heng, Y. K. ;
Hou, J. ;
Hu, H. M. ;
Hu, J. H. ;
Hu, T. ;
Huang, X. T. ;
Ji, X. B. ;
Jiang, X. S. ;
Jiang, X. Y. ;
Jiao, J. B. ;
Jin, D. P. ;
Jin, S. ;
Lai, Y. F. ;
Li, G. ;
Li, H. B. ;
Li, J. ;
Li, R. Y. ;
Li, S. M. ;
Li, W. D. ;
Li, W. G. ;
Li, X. L. ;
Li, X. N. ;
Li, X. Q. ;
Liang, Y. F. .
PHYSICS LETTERS B, 2007, 644 (01) :20-24
[4]  
Abomhara M., 2015, J CYBER SECURITY, V4, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
[5]  
Abrahams T O., 2024, Computer Science IT Research Journal, V5, P120, DOI [DOI 10.51594/CSITRJ.V5I.708, 10.51594/csitrj.v5i1.709, DOI 10.51594/CSITRJ.V5I1.709]
[6]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[7]  
Aghaei Ehsan, 2023, Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (462), P39, DOI 10.1007/978-3-031-25538-0_3
[8]   Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models [J].
Ahmed, Toufique ;
Ghosh, Supriyo ;
Bansal, Chetan ;
Zimmermann, Thomas ;
Zhang, Xuchao ;
Rajmohan, Saravan .
2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, :1737-1749
[9]  
Al-Daeef M.M., 2017, Lect. Notes Eng. Comput. Sci.
[10]  
Al-Hawamleh A., 2024, INT J COMPUTING DIGI, V15, P1315, DOI DOI 10.12785/IJCDS/150193