A Survey of Deep Learning Methods for Cyber Security

被引:291
作者
Berman, Daniel S. [1 ]
Buczak, Anna L. [1 ]
Chavis, Jeffrey S. [1 ]
Corbett, Cherita L. [1 ]
机构
[1] JHU, Appl Phys Lab, APL1, Laurel, MD 20910 USA
关键词
cyber analytics; deep learning; deep neural networks; deep autoencoders; deep belief networks; restricted Boltzmann machines; convolutional neural networks; ANDROID MALWARE CHARACTERIZATION; NETWORK INTRUSION DETECTION; ATTACK DETECTION; BELIEF NETWORKS; NEURAL-NETWORKS; REPRESENTATIONS; CLASSIFICATION; INTERNET;
D O I
10.3390/info10040122
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural networks, generative adversarial networks, and several others. Then we discuss how each of the DL methods is used for security applications. We cover a broad array of attack types including malware, spam, insider threats, network intrusions, false data injection, and malicious domain names used by botnets.
引用
收藏
页数:35
相关论文
共 50 条
[21]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[22]   Aspect-Based Sentiment Analysis: A Survey of Deep Learning Methods [J].
Liu, Haoyue ;
Chatterjee, Ishani ;
Zhou, MengChu ;
Lu, Xiaoyu Sean ;
Abusorrah, Abdullah .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (06) :1358-1375
[23]   Deep Learning in Microscopy Image Analysis: A Survey [J].
Xing, Fuyong ;
Xie, Yuanpu ;
Su, Hai ;
Liu, Fujun ;
Yang, Lin .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (10) :4550-4568
[24]   A Survey on Deep Learning for Human Activity Recognition [J].
Gu, Fuqiang ;
Chung, Mu-Huan ;
Chignell, Mark ;
Valaee, Shahrokh ;
Zhou, Baoding ;
Liu, Xue .
ACM COMPUTING SURVEYS, 2021, 54 (08)
[25]   Cyber Security Intruder Detection Using Deep Learning Approach [J].
Islam, Tariqul ;
Rahman, Md Mosfikur ;
Jabiullah, Md Ismail ;
Saifuzzaman, Mohd .
INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021, 2023, 521 :518-530
[26]   A Novel Cyber Security Model Using Deep Transfer Learning [J].
Cavusoglu, Unal ;
Akgun, Devrim ;
Hizal, Selman .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) :3623-3632
[27]   A Novel Cyber Security Model Using Deep Transfer Learning [J].
Ünal Çavuşoğlu ;
Devrim Akgun ;
Selman Hizal .
Arabian Journal for Science and Engineering, 2024, 49 :3623-3632
[28]   ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing [J].
dos Santos, Claudio Filipi Goncalves ;
Arrais, Rodrigo Reis ;
da Silva, Jhessica Victoria Santos ;
da Silva, Matheus Henrique Marques ;
Neto, Wladimir Barroso Guedes de Araujo ;
Lopes, Leonardo Tadeu ;
Bileki, Guilherme Augusto ;
Lima, Iago Oliveira ;
Rondon, Lucas Borges ;
de Souza, Bruno Melo ;
Regazio, Mayara Costa ;
Dalapicola, Rodolfo Coelho ;
Tasca, Arthur Alves .
ACM COMPUTING SURVEYS, 2025, 57 (05)
[29]   A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems [J].
Gaba, Shivani ;
Budhiraja, Ishan ;
Kumar, Vimal ;
Martha, Sheshikala ;
Khurmi, Jebreel ;
Singh, Akansha ;
Singh, Krishna Kant ;
Askar, S. S. ;
Abouhawwash, Mohamed .
IEEE ACCESS, 2024, 12 :6017-6035
[30]   Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches [J].
Kotenko, Igor ;
Izrailov, Konstantin ;
Buinevich, Mikhail .
SENSORS, 2022, 22 (04)