Anomaly Detection for Cyber-Security Based on Convolution Neural Network : A survey

被引:7
作者
Alabadi, Montdher [1 ]
Celik, Yuksel [1 ]
机构
[1] Karabuk Univ, Comp Engn Dept, Karabuk, Turkey
来源
2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020) | 2020年
关键词
Anomaly Detection; CNN; Deep Learning; Security;
D O I
10.1109/hora49412.2020.9152899
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The expanding growth of computer and communication technologies results in a vast amount of security concerns. Various types of cyber-security enabled mechanisms have been developed to limit these concerns. Anomaly detection is among these mechanisms. Anomaly detection means using multiple techniques and methods to detect different patterns that do not conform to defined features of whole data. Recently, deep learning techniques adopted as a satisfactory solution because of its ability to extract data features from data itself. Convolution neural network (CNN) is mainly utilized because of its ability to process input with multi-dimensions. In this paper, a comprehensive survey about using CNN as a key solution for anomaly detection is provided. Most of the existing solutions in the literature have been gathered and classified according to the input data source; furthermore, this paper suggests a unified cross framework that simulates end-to-end anomaly detection mechanisms that exist in the previous studies. A unified cross framework enriches this paper with in-depth analysis to clarify how the solution in the literature uses CNN in anomaly detection. Finally, this paper suggests several future research directions that can support the audience in their future works in this context.
引用
收藏
页码:558 / 571
页数:14
相关论文
共 50 条
[1]   Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions [J].
Ahmad, Bilal ;
Jian, Wang ;
Ali, Zain Anwar .
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2018, 2018
[2]  
Nguyen AD, 2019, IEEE IMAGE PROC, P4275, DOI [10.1109/ICIP.2019.8803537, 10.1109/icip.2019.8803537]
[3]  
Bennaceur K., 2019, 2019 INT C CONTR AUT
[4]  
Chandran S., 2018, INT J ENG TECHNOLOGY, V7, P187
[5]  
Cheng A, 2019, 2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), P728, DOI [10.1109/iemcon.2019.8936224, 10.1109/IEMCON.2019.8936224]
[6]   A tutorial on the cross-entropy method [J].
De Boer, PT ;
Kroese, DP ;
Mannor, S ;
Rubinstein, RY .
ANNALS OF OPERATIONS RESEARCH, 2005, 134 (01) :19-67
[7]   State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow's Intelligent Network Traffic Control Systems [J].
Fadlullah, Zubair Md. ;
Tang, Fengxiao ;
Mao, Bomin ;
Kato, Nei ;
Akashi, Osamu ;
Inoue, Takeru ;
Mizutani, Kimihiro .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2432-2455
[8]   Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature Review [J].
Fahim, Muhammad ;
Sillitti, Alberto .
IEEE ACCESS, 2019, 7 :81664-81681
[9]  
Fatemifar S., 2019, INT CONF BIOMETR, P1, DOI [DOI 10.1109/icb45273.2019.8987326, DOI 10.1109/ICB45273.2019.8987326]