Machine Learning and Deep Learning Methods for Cybersecurity

被引:589
作者
Xin, Yang [1 ,2 ]
Kong, Lingshuang [3 ]
Liu, Zhi [2 ,3 ]
Chen, Yuling [2 ]
Li, Yanmiao [1 ]
Zhu, Hongliang [1 ]
Gao, Mingcheng [1 ]
Hou, Haixia [1 ]
Wang, Chunhua [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Ctr Informat Secur, Beijing 100876, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[3] Shandong Univ, Sch Informat Sci & Engn, Jinan 250100, Shandong, Peoples R China
[4] China Changfeng Sci Technology Ind Grp Corp, Beijing 100854, Peoples R China
基金
国家重点研发计划;
关键词
Cybersecurity; intrusion detection; deep learning; machine learning; INTRUSION; SYSTEMS; MODEL;
D O I
10.1109/ACCESS.2018.2836950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the Internet, cyber-attacks are changing rapidly and the cyber security situation is not optimistic. This survey report describes key literature surveys on machine learning (ML) and deep learning (DL) methods for network analysis of intrusion detection and provides a brief tutorial description of each ML/DL method. Papers representing each method were indexed, read, and summarized based on their temporal or thermal correlations. Because data are so important in ML/DL methods, we describe some of the commonly used network datasets used in ML/DL, discuss the challenges of using ML/DL for cybersecurity and provide suggestions for research directions.
引用
收藏
页码:35365 / 35381
页数:17
相关论文
共 78 条
[51]   Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split [J].
Puthran, Shubha ;
Shah, Ketan .
SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 :427-438
[52]  
Rai Kajal, 2016, International Journal of Advanced Networking and Applications, V7, P2828
[53]  
Rao B.B., 2017, INDIAN J SCI TECHNOL, V10, P1, DOI DOI 10.17485/ijst/2017/v10i14/93690
[54]  
Relan NG, 2015, P INT C NASC TECHN E, P1, DOI DOI 10.1109/ICNTE.2015.7029925
[55]  
Revathi S., 2013, Int. J. Eng. Res. Technol. (IJERT), V2, P1848
[56]  
Sahoo DoyenChenghao Liu Steven CH Hoi., 2017, MALICIOUS URL DETECT
[57]  
Saxena H., 2014, Int. J. Comput. Appl., V98, P25, DOI [10.5120/17188-7369, DOI 10.5120/17188-7369]
[58]   An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree [J].
Selvi, R. ;
Kumar, S. Saravan ;
Suresh, A. .
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 :205-212
[59]  
Shapoorifard H., 2017, Int. J. Comput. Appl., V173, P5, DOI [10.5120/ijca2017914340, DOI 10.5120/IJCA2017914340]
[60]  
Sharifi S.A.K. A. M., 2015, Journal of Convergence Information Technology, V10, P42