Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

被引:2
|
作者
Torre, Damiano [1 ]
Mesadieu, Frantzy [1 ]
Chennamaneni, Anitha [1 ]
机构
[1] Texas A&M Univ Cent Texas, Dept Comp Informat Syst, 1001 Leadership Pl, Killeen, TX 76549 USA
关键词
Deep learning; Cybersecurity; Systematic mapping study; Systematic review; NETWORK INTRUSION DETECTION; ANOMALY DETECTION; CYBER-SECURITY; FRAMEWORK; IDENTIFICATION; AUTOENCODER; STRATEGY; SVM;
D O I
10.1007/s10664-023-10302-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextRecent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.ObjectiveTo deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.MethodWe conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.ResultsFrom an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.ConclusionsWe provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.
引用
收藏
页数:71
相关论文
共 50 条
  • [31] Deep learning applications on cybersecurity: A practical approach
    Miranda-Garcia, Alberto
    Rego, Agustin Zubillaga
    Pastor-Lopez, Iker
    Sanz, Borja
    Tellaeche, Alberto
    Gaviria, Jose
    Bringas, Pablo G.
    NEUROCOMPUTING, 2024, 563
  • [32] A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity
    Dasgupta, Soham
    Piplai, Aritran
    Kotal, Anantaa
    Joshi, Anupam
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2596 - 2604
  • [33] A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks
    Lent, Daniel M. Brandao
    Novaes, Matheus P.
    Carvalho, Luiz F.
    Lloret, Jaime
    Rodrigues, Joel J. P. C.
    Proenca Jr, Mario Lemes
    IEEE ACCESS, 2022, 10 : 73229 - 73242
  • [34] Multi-Agent Distributed Deep Learning Algorithm to Detect Cyber-Attacks in Distance Relays
    Rajaee, Meysam
    Mazlumi, Kazem
    IEEE ACCESS, 2023, 11 : 10842 - 10849
  • [35] Deep learning approaches for detecting DDoS attacks: a systematic review
    Mittal, Meenakshi
    Kumar, Krishan
    Behal, Sunny
    SOFT COMPUTING, 2023, 27 (18) : 13039 - 13075
  • [36] Data Augmentation Techniques to Detect Cervical Cancer Using Deep Learning: A Systematic Review
    Wubineh, Betelhem Zewdu
    Rusiecki, Andrzej
    Halawa, Krzysztof
    SYSTEM DEPENDABILITY-THEORY AND APPLICATIONS, DEPCOS-RELCOMEX 2024, 2024, 1026 : 325 - 336
  • [37] Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
    Pritee, Zinniya Taffannum
    Anik, Mehedi Hasan
    Alam, Saida Binta
    Jim, Jamin Rahman
    Kabir, Md Mohsin
    Mridha, M. F.
    COMPUTERS & SECURITY, 2024, 140
  • [38] Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models
    Girdhar, Mansi
    Hong, Junho
    Moore, John
    IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2023, 4 : 417 - 437
  • [39] Video Processing Using Deep Learning Techniques: A Systematic Literature Review
    Sharma, Vijeta
    Gupta, Manjari
    Kumar, Ajai
    Mishra, Deepti
    IEEE ACCESS, 2021, 9 : 139489 - 139507
  • [40] Deep learning for retinal vessel segmentation: a systematic review of techniques and applications
    Liu, Zhihui
    Sunar, Mohd Shahrizal
    Tan, Tian Swee
    Hitam, Wan Hazabbah Wan
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2025,