When LLMs meet cybersecurity: a systematic literature review

被引:8
作者
Zhang, Jie [1 ,2 ]
Bu, Haoyu [1 ,2 ]
Wen, Hui [1 ,2 ]
Liu, Yongji [1 ,2 ]
Fei, Haiqiang [1 ,2 ]
Xi, Rongrong [1 ,2 ]
Li, Lun [1 ,2 ]
Yang, Yun [1 ,2 ]
Zhu, Hongsong [1 ,2 ]
Meng, Dan [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, 19 Shucun Rd, Beijing 100085, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Cybersecurity; Cyber attack; Cyber defense; Large language model; Agent;
D O I
10.1186/s42400-025-00361-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of large language models (LLMs) has opened new avenues across various fields, including cybersecurity, which faces an evolving threat landscape and demand for innovative technologies. Despite initial explorations into the application of LLMs in cybersecurity, there is a lack of a comprehensive overview of this research area. This paper addresses this gap by providing a systematic literature review, covering the analysis of over 300 works, encompassing 25 LLMs and more than 10 downstream scenarios. Our comprehensive overview addresses three key research questions: the construction of cybersecurity-oriented LLMs, the application of LLMs to various cybersecurity tasks, the challenges and further research in this area. This study aims to shed light on the extensive potential of LLMs in enhancing cybersecurity practices and serve as a valuable resource for applying LLMs in this field. We also maintain and regularly update a list of practical guides on LLMs for cybersecurity at https://github.com/tmylla/Awesome-LLM4Cybersecurity.
引用
收藏
页数:41
相关论文
共 361 条
[1]  
Ahmad B, 2023, Arxiv, DOI arXiv:2306.12643
[2]  
Ahmad B, 2023, Arxiv, DOI arXiv:2302.01215
[3]   Better patching using LLM prompting, via Self-Consistency [J].
Ahmed, Toufique ;
Devanbu, Premkumar .
2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, :1742-1746
[4]  
Alam MT, 2024, 38 C NEUR INF PROC S
[5]  
Alec RadfordKarthik Narasimhan., 2018, IMPROVING LANGUAGE U
[6]  
Ali T, 2023, Arxiv, DOI arXiv:2309.16021
[7]  
Alrashedy K, 2024, Arxiv, DOI arXiv:2312.00024
[8]  
An K, 2024, ECAI 2024, V392, P4471
[9]   A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions [J].
Aslan, Omer ;
Aktug, Semih Serkant ;
Ozkan-Okay, Merve ;
Yilmaz, Abdullah Asim ;
Akin, Erdal .
ELECTRONICS, 2023, 12 (06)
[10]  
Asmita Oliinyk Y, 2024, 33 USENIX SEC S USEN