Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

被引:2
|
作者
Torre, Damiano [1 ]
Mesadieu, Frantzy [1 ]
Chennamaneni, Anitha [1 ]
机构
[1] Texas A&M Univ Cent Texas, Dept Comp Informat Syst, 1001 Leadership Pl, Killeen, TX 76549 USA
关键词
Deep learning; Cybersecurity; Systematic mapping study; Systematic review; NETWORK INTRUSION DETECTION; ANOMALY DETECTION; CYBER-SECURITY; FRAMEWORK; IDENTIFICATION; AUTOENCODER; STRATEGY; SVM;
D O I
10.1007/s10664-023-10302-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextRecent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.ObjectiveTo deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.MethodWe conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.ResultsFrom an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.ConclusionsWe provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.
引用
收藏
页数:71
相关论文
共 50 条
  • [41] A Comparative Study to Deep Learning for Pattern Recognition, By using Online and Batch Learning; Taking Cybersecurity as a case
    Djellali, Choukri
    Adda, Mehdi
    Moutacalli, Mohamed Tarik
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, : 907 - 912
  • [42] GIS Mapping and Spatial Analysis of Cybersecurity Attacks on a Florida University
    Hu, Zhiyong
    Baynard, Chris W.
    Hu, Hongda
    Fazio, Michael
    2015 23RD INTERNATIONAL CONFERENCE ON GEOINFORMATICS, 2015,
  • [43] Determining Viability of Deep Learning on Cybersecurity Log Analytics
    Lorenzen, Casey
    Agrawal, Rajeev
    King, Jason
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4806 - 4811
  • [44] A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
    Thierno Gueye
    Yanen Wang
    Mudassar Rehman
    Ray Tahir Mushtaq
    Sadaf Zahoor
    Cluster Computing, 2023, 26 : 2947 - 2973
  • [45] A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
    Gueye, Thierno
    Wang, Yanen
    Rehman, Mudassar
    Mushtaq, Ray Tahir
    Zahoor, Sadaf
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05): : 2947 - 2973
  • [46] Evaluation of Deep Learning Techniques in PV Farm Cyber Attacks Detection
    Hassan, Ghufran F.
    Ahmed, Oday A.
    Sallal, Muntadher
    ELECTRONICS, 2025, 14 (03):
  • [47] A new DDoS attacks intrusion detection model based on deep learning for cybersecurity
    Akgun, Devrim
    Hizal, Selman
    Cavusoglu, Unal
    COMPUTERS & SECURITY, 2022, 118
  • [48] Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
    Khaleel, Yahya Layth
    Habeeb, Mustafa Abdulfattah
    Albahri, A. S.
    Al-Quraishi, Tahsien
    Albahri, O. S.
    Alamoodi, A. H.
    JOURNAL OF INTELLIGENT SYSTEMS, 2024, 33 (01)
  • [49] Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity
    Pawlicki, Marek
    Pawlicka, Aleksandra
    Kozik, Rafal
    Choras, Michal
    NEUROCOMPUTING, 2024, 590
  • [50] Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
    Ali, Tariq Emad
    Chong, Yung-Wey
    Manickam, Selvakumar
    APPLIED SCIENCES-BASEL, 2023, 13 (05):