Machine Learning and Deep Learning Methods for Cybersecurity

被引:589
作者
Xin, Yang [1 ,2 ]
Kong, Lingshuang [3 ]
Liu, Zhi [2 ,3 ]
Chen, Yuling [2 ]
Li, Yanmiao [1 ]
Zhu, Hongliang [1 ]
Gao, Mingcheng [1 ]
Hou, Haixia [1 ]
Wang, Chunhua [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Ctr Informat Secur, Beijing 100876, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[3] Shandong Univ, Sch Informat Sci & Engn, Jinan 250100, Shandong, Peoples R China
[4] China Changfeng Sci Technology Ind Grp Corp, Beijing 100854, Peoples R China
基金
国家重点研发计划;
关键词
Cybersecurity; intrusion detection; deep learning; machine learning; INTRUSION; SYSTEMS; MODEL;
D O I
10.1109/ACCESS.2018.2836950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the Internet, cyber-attacks are changing rapidly and the cyber security situation is not optimistic. This survey report describes key literature surveys on machine learning (ML) and deep learning (DL) methods for network analysis of intrusion detection and provides a brief tutorial description of each ML/DL method. Papers representing each method were indexed, read, and summarized based on their temporal or thermal correlations. Because data are so important in ML/DL methods, we describe some of the commonly used network datasets used in ML/DL, discuss the challenges of using ML/DL for cybersecurity and provide suggestions for research directions.
引用
收藏
页码:35365 / 35381
页数:17
相关论文
共 78 条
[1]  
Aftergood S, 2017, NATURE, V547, P30, DOI 10.1038/547030a
[2]  
Agarap A.F., 2017, NEURAL NETWORK ARCHI
[3]  
Alom M. Z., 2016, AER EL C, P339, DOI DOI 10.1109/NAECON.2015.7443094
[4]  
Ammar A., 2015, Journal of Computer and Communications, V3, P52
[5]   Sustainability, value, and satisfaction: Model testing and cross-validation in tourist destinations [J].
Angeles Iniesta-Bonillo, M. ;
Sanchez-Fernandez, Raquel ;
Jimenez-Castillo, David .
JOURNAL OF BUSINESS RESEARCH, 2016, 69 (11) :5002-5007
[6]  
[Anonymous], 2017, P 2016 15 IEEE INT C
[7]  
[Anonymous], 2015, South African Computer Journal, DOI DOI 10.18489/SACJ.V56I1.248
[8]  
[Anonymous], 2017, Tech. Rep.
[9]  
Azad Chandrashekhar, 2015, International Journal of Computer Network and Information Security, V7, P56, DOI 10.5815/ijcnis.2015.08.07
[10]  
Balogun A. O., 2015, J ADV SCI RES APPL, V2, P67