Skip to main content
Erschienen in: Empirical Software Engineering 3/2023

01.05.2023

Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

verfasst von: Damiano Torre, Frantzy Mesadieu, Anitha Chennamaneni

Erschienen in: Empirical Software Engineering | Ausgabe 3/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Context

Recent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.

Objective

To deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.

Method

We conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.

Results

From an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.

Conclusions

We provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
3
We will provide the link to the replication package once the manuscript is accepted for publication.
 
Literatur
Zurück zum Zitat Ahmed A, Krishnan VVG, Foroutan SA, Touhiduzzaman M, Srivastava A, Wu Y, Hahn A, Sindhu S (2018) Cyber physical security analytics for anomalies in transmission protection systems. In: IEEE Industry Applications Society Annual Meeting, IAS 2018, Portland, OR, USA, September 23-27, 2018, IEEE, pp 1–8. https://doi.org/10.1109/IAS.2018.8544672 Ahmed A, Krishnan VVG, Foroutan SA, Touhiduzzaman M, Srivastava A, Wu Y, Hahn A, Sindhu S (2018) Cyber physical security analytics for anomalies in transmission protection systems. In: IEEE Industry Applications Society Annual Meeting, IAS 2018, Portland, OR, USA, September 23-27, 2018, IEEE, pp 1–8. https://​doi.​org/​10.​1109/​IAS.​2018.​8544672
Zurück zum Zitat Ali R, Ali A, Iqbal F, Khattak A M, Aleem S (2019) A systematic review of artificial intelligence and machine learning techniques for cyber security. In: Tian Y, Ma T, Khan M K (eds) Big data and security. Springer, Singapore, pp 584–593 Ali R, Ali A, Iqbal F, Khattak A M, Aleem S (2019) A systematic review of artificial intelligence and machine learning techniques for cyber security. In: Tian Y, Ma T, Khan M K (eds) Big data and security. Springer, Singapore, pp 584–593
Zurück zum Zitat Alrawashdeh K, Purdy C (2016) Toward an online anomaly intrusion detection system based on deep learning. In: 15th IEEE International Conference on Machine Learning and Applications, ICMLA 2016, Anaheim, CA, USA, December 18-20, 2016, IEEE Computer Society, pp 195–200. https://doi.org/10.1109/ICMLA.2016.0040 Alrawashdeh K, Purdy C (2016) Toward an online anomaly intrusion detection system based on deep learning. In: 15th IEEE International Conference on Machine Learning and Applications, ICMLA 2016, Anaheim, CA, USA, December 18-20, 2016, IEEE Computer Society, pp 195–200. https://​doi.​org/​10.​1109/​ICMLA.​2016.​0040
Zurück zum Zitat Amodei D, Ananthanarayanan S, Anubhai R, Bai J, Battenberg E, Case C, Casper J, Catanzaro B, Chen J, Chrzanowski M, Coates A, Diamos G, Elsen E, Engel JH, Fan L, Fougner C, Hannun AY, Jun B, Han T, LeGresley P, Li X, Lin L, Narang S, Ng AY, Ozair S, Prenger R, Qian S, Raiman J, Satheesh S, Seetapun D, Sengupta S, Wang C, Wang Y, Wang Z, Xiao B, Xie Y, Yogatama D, Zhan J, Zhu Z (2016) Deep speech 2 : End-to-end speech recognition in english and mandarin. In: Balcan M, Weinberger KQ (eds) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016, JMLR.org, JMLR Workshop and Conference Proceedings, vol 48, pp 173–182 Amodei D, Ananthanarayanan S, Anubhai R, Bai J, Battenberg E, Case C, Casper J, Catanzaro B, Chen J, Chrzanowski M, Coates A, Diamos G, Elsen E, Engel JH, Fan L, Fougner C, Hannun AY, Jun B, Han T, LeGresley P, Li X, Lin L, Narang S, Ng AY, Ozair S, Prenger R, Qian S, Raiman J, Satheesh S, Seetapun D, Sengupta S, Wang C, Wang Y, Wang Z, Xiao B, Xie Y, Yogatama D, Zhan J, Zhu Z (2016) Deep speech 2 : End-to-end speech recognition in english and mandarin. In: Balcan M, Weinberger KQ (eds) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016, JMLR.org, JMLR Workshop and Conference Proceedings, vol 48, pp 173–182
Zurück zum Zitat Araujo F, Ayoade G, Al-Naami K, Gao Y, Hamlen KW, Khan L (2019) Improving intrusion detectors by crook-sourcing. In: Balenson D (ed) Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019, ACM, pp 245–256. https://doi.org/10.1145/3359789.3359822 Araujo F, Ayoade G, Al-Naami K, Gao Y, Hamlen KW, Khan L (2019) Improving intrusion detectors by crook-sourcing. In: Balenson D (ed) Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019, ACM, pp 245–256. https://​doi.​org/​10.​1145/​3359789.​3359822
Zurück zum Zitat Ayoade G, Araujo F, Al-Naami K, Mustafa AM, Gao Y, Hamlen KW, Khan L (2020) Automating cyberdeception evaluation with deep learning. In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, ScholarSpace, pp 1–10 Ayoade G, Araujo F, Al-Naami K, Mustafa AM, Gao Y, Hamlen KW, Khan L (2020) Automating cyberdeception evaluation with deep learning. In: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui, Hawaii, USA, January 7-10, 2020, ScholarSpace, pp 1–10
Zurück zum Zitat Berman DS, Buczak AL, Corbett CL (2019) A survey of deep learning methods for cyber security. Inf 10(4):122 Berman DS, Buczak AL, Corbett CL (2019) A survey of deep learning methods for cyber security. Inf 10(4):122
Zurück zum Zitat Bhamidipati S, Kim K, Sun H, Orlik P, Zhang J (2019) Joint BP and RNN for resilient GPS timing against spoofing attacks. In: S H, L Y, W M (eds) Artificial Intelligence for Communications and Networks (AICON), Springer, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. https://doi.org/10.1007/978-3-030-22971-9_17 Bhamidipati S, Kim K, Sun H, Orlik P, Zhang J (2019) Joint BP and RNN for resilient GPS timing against spoofing attacks. In: S H, L Y, W M (eds) Artificial Intelligence for Communications and Networks (AICON), Springer, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. https://​doi.​org/​10.​1007/​978-3-030-22971-9_​17
Zurück zum Zitat Budgen D, Turner M, Brereton P, Kitchenham BA (2008) Using mapping studies in software engineering. In: Proceedings of the 20th Annual Workshop of the Psychology of Programming Interest Group, PPIG 2008, Lancaster, UK, September 10-12, 2008, Psychology of Programming Interest Group, p 20 Budgen D, Turner M, Brereton P, Kitchenham BA (2008) Using mapping studies in software engineering. In: Proceedings of the 20th Annual Workshop of the Psychology of Programming Interest Group, PPIG 2008, Lancaster, UK, September 10-12, 2008, Psychology of Programming Interest Group, p 20
Zurück zum Zitat Ding F, Li H Luo F, Hu H, Cheng L, Xiao H, Ge R (2020) Deeppower: Non-intrusive and deep learning-based detection of iot malware using power side channels. In: Sun H, Shieh S, Gu G, Ateniese G (eds) ASIA CCS ’20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, ACM, pp 33–46. https://doi.org/10.1145/3320269.3384727 Ding F, Li H Luo F, Hu H, Cheng L, Xiao H, Ge R (2020) Deeppower: Non-intrusive and deep learning-based detection of iot malware using power side channels. In: Sun H, Shieh S, Gu G, Ateniese G (eds) ASIA CCS ’20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, ACM, pp 33–46. https://​doi.​org/​10.​1145/​3320269.​3384727
Zurück zum Zitat Ebrahimi M, Jr JFN, hen H (2020) Semi-supervised cyber threat identification in dark net markets: A transductive and deep learning approach. J Manag Inf Syst 37(3):694–722 Ebrahimi M, Jr JFN, hen H (2020) Semi-supervised cyber threat identification in dark net markets: A transductive and deep learning approach. J Manag Inf Syst 37(3):694–722
Zurück zum Zitat Faker O, Dogdu E (2019) Intrusion detection using big data and deep learning techniques. In: Lo D, Kim D, Gamess E (eds) Proceedings of the 2019 ACM Southeast Conference, ACM SE ’19, Kennesaw, GA, USA, April 18-20, 2019, ACM, pp 86–93 https://doi.org/10.1145/3299815.3314439 Faker O, Dogdu E (2019) Intrusion detection using big data and deep learning techniques. In: Lo D, Kim D, Gamess E (eds) Proceedings of the 2019 ACM Southeast Conference, ACM SE ’19, Kennesaw, GA, USA, April 18-20, 2019, ACM, pp 86–93 https://​doi.​org/​10.​1145/​3299815.​3314439
Zurück zum Zitat Farukee MB, Shabit MSZ, Haque MR, Sattar AHMS (2020) Ddos attack detection in iot networks using deep learning models combined with random forest as feature selector. In: Anbar M, Abdullah N, Manickam S (eds) Advances in Cyber Security - Second International Conference ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers, Springer, Communications in Computer and Information Science, vol 1347, pp 118–134 Farukee MB, Shabit MSZ, Haque MR, Sattar AHMS (2020) Ddos attack detection in iot networks using deep learning models combined with random forest as feature selector. In: Anbar M, Abdullah N, Manickam S (eds) Advances in Cyber Security - Second International Conference ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers, Springer, Communications in Computer and Information Science, vol 1347, pp 118–134
Zurück zum Zitat Ghanem WAHM, Jantan A (2020) A new approach for intrusion detection system based on training multilayer perceptron by using enhanced bat algorithm. Neural Comput Appl 32(15):11665–11698CrossRef Ghanem WAHM, Jantan A (2020) A new approach for intrusion detection system based on training multilayer perceptron by using enhanced bat algorithm. Neural Comput Appl 32(15):11665–11698CrossRef
Zurück zum Zitat Goodfellow IJ, Bengio Y, Courville AC (2016) Deep Learning. Adaptive computation and machine learning. MIT Press, CambridgeMATH Goodfellow IJ, Bengio Y, Courville AC (2016) Deep Learning. Adaptive computation and machine learning. MIT Press, CambridgeMATH
Zurück zum Zitat Hanif S, Ilyas T, Zeeshan M (2019) Intrusion detection in iot using artificial neural networks on unsw-15 dataset. In: 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT IoT and AI (HONET-ICT), pp 152–156 https://doi.org/10.1109/HONET.2019.8908122 Hanif S, Ilyas T, Zeeshan M (2019) Intrusion detection in iot using artificial neural networks on unsw-15 dataset. In: 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT IoT and AI (HONET-ICT), pp 152–156 https://​doi.​org/​10.​1109/​HONET.​2019.​8908122
Zurück zum Zitat He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, IEEE Computer Society, pp 770–778. https://doi.org/10.1109/CVPR.2016.90 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, IEEE Computer Society, pp 770–778. https://​doi.​org/​10.​1109/​CVPR.​2016.​90
Zurück zum Zitat Hendler D, Kels S, Rubin A (2018) Detecting malicious powershell commands using deep neural networks. In: Kim J, Ahn G, Kim S, Kim Y, López J, Kim T (eds) Proceedings of the 2018 on Asia Conference on Computer and Communications Security AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018, ACM, pp 187–197. https://doi.org/10.1145/3196494.3196511 Hendler D, Kels S, Rubin A (2018) Detecting malicious powershell commands using deep neural networks. In: Kim J, Ahn G, Kim S, Kim Y, López J, Kim T (eds) Proceedings of the 2018 on Asia Conference on Computer and Communications Security AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018, ACM, pp 187–197. https://​doi.​org/​10.​1145/​3196494.​3196511
Zurück zum Zitat Hinton G, Deng L, Yu D, Dahl GE, Mohamed AR, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath TN, Kingsbury B (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal . Processing Magazine 29(6):82–97. https://doi.org/10.1109/MSP.2012.2205597CrossRef Hinton G, Deng L, Yu D, Dahl GE, Mohamed AR, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath TN, Kingsbury B (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal . Processing Magazine 29(6):82–97. https://​doi.​org/​10.​1109/​MSP.​2012.​2205597CrossRef
Zurück zum Zitat Hou S, Saas A, Chen L, Ye Y (2016) Deep4maldroid: A deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE/WIC/ACM International Conference on Web Intelligence - Workshops, WI 2016 Workshops, Omaha, NE, USA, October 13-16, 2016, IEEE Computer Society, pp 104–111. https://doi.org/10.1109/WIW.2016.040 Hou S, Saas A, Chen L, Ye Y (2016) Deep4maldroid: A deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE/WIC/ACM International Conference on Web Intelligence - Workshops, WI 2016 Workshops, Omaha, NE, USA, October 13-16, 2016, IEEE Computer Society, pp 104–111. https://​doi.​org/​10.​1109/​WIW.​2016.​040
Zurück zum Zitat Kao H (2018) R2-D2: color-inspired convolutional neural network (cnn)-based android malware detections. In: Abe N, Liu H, Pu C, Hu X, Ahmed NK, Qiao M, Song Y, Kossmann D, Liu B, Lee K, Tang J, e J, altz JS (eds) IEEE International Conference on Big Data, Big Data 2018, Seattle, WA, USA, December 10-13, 2018, IEEE, pp 2633–2642 https://doi.org/10.1109/BigData.2018.8622324 Kao H (2018) R2-D2: color-inspired convolutional neural network (cnn)-based android malware detections. In: Abe N, Liu H, Pu C, Hu X, Ahmed NK, Qiao M, Song Y, Kossmann D, Liu B, Lee K, Tang J, e J, altz JS (eds) IEEE International Conference on Big Data, Big Data 2018, Seattle, WA, USA, December 10-13, 2018, IEEE, pp 2633–2642 https://​doi.​org/​10.​1109/​BigData.​2018.​8622324
Zurück zum Zitat Javeed D, ao T, Khan MT (2021) Sdn-enabled hybrid dl-driven framework for the detection of emerging cyber threats in iot. Electronics 10(8):918CrossRef Javeed D, ao T, Khan MT (2021) Sdn-enabled hybrid dl-driven framework for the detection of emerging cyber threats in iot. Electronics 10(8):918CrossRef
Zurück zum Zitat Jia T, Wu Y, ou C, Li Y (2021) Logflash: Real-time streaming anomaly detection and diagnosis from system logs for large-scale software systems learning. In: 21st IEEE International Conference on Software Quality, Reliability, and Security QRS 2021, Hainan Island,China, December 16-20, 2021, IEEE Computer Society Jia T, Wu Y, ou C, Li Y (2021) Logflash: Real-time streaming anomaly detection and diagnosis from system logs for large-scale software systems learning. In: 21st IEEE International Conference on Software Quality, Reliability, and Security QRS 2021, Hainan Island,China, December 16-20, 2021, IEEE Computer Society
Zurück zum Zitat Kim H, Park J, won H, ang K, hoi S, Seo H (2020b) Detecting block cipher encryption for defense against crypto ransomware on low-end internet of things. In: You I (ed) Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers, Springer, Lecture Notes in Computer Science, vol 12583, pp 16–30. https://doi.org/10.1007/978-3-030-65299-9_2 Kim H, Park J, won H, ang K, hoi S, Seo H (2020b) Detecting block cipher encryption for defense against crypto ransomware on low-end internet of things. In: You I (ed) Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers, Springer, Lecture Notes in Computer Science, vol 12583, pp 16–30. https://​doi.​org/​10.​1007/​978-3-030-65299-9_​2
Zurück zum Zitat Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. Rep. EBSE 2007-001, Keele University and Durham University Joint Report Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. Rep. EBSE 2007-001, Keele University and Durham University Joint Report
Zurück zum Zitat Krishna CGL, Murphy RR (2017) A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: IEEE International Symposium on Safety, Security and Rescue Robotics, SSRR 2017, Shanghai, China, October 11-13, 2017, IEEE, pp 194–199. https://doi.org/10.1109/SSRR.2017.8088163 Krishna CGL, Murphy RR (2017) A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: IEEE International Symposium on Safety, Security and Rescue Robotics, SSRR 2017, Shanghai, China, October 11-13, 2017, IEEE, pp 194–199. https://​doi.​org/​10.​1109/​SSRR.​2017.​8088163
Zurück zum Zitat Li D, Chen D, Jin B, Shi L, Goh J, Ng S (2019a) MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: Tetko IV, Kurková V, Karpov P, heis FJ (eds) Artificial Neural Networks and Machine Learning - ICANN 2019: Text and Time Series - 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17-19, 2019, Proceedings, Part IV, Springer, Lecture Notes in Computer Science, vol 11730, pp 703–716. https://doi.org/10.1007/978-3-030-30490-4_56 Li D, Chen D, Jin B, Shi L, Goh J, Ng S (2019a) MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: Tetko IV, Kurková V, Karpov P, heis FJ (eds) Artificial Neural Networks and Machine Learning - ICANN 2019: Text and Time Series - 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17-19, 2019, Proceedings, Part IV, Springer, Lecture Notes in Computer Science, vol 11730, pp 703–716. https://​doi.​org/​10.​1007/​978-3-030-30490-4_​56
Zurück zum Zitat Li Z, Zou D, Xu S, Ou X, Jin H, Wang S, Deng Z, Zhong Y (2018) Vuldeepecker: A deep learning-based system for vulnerability detection. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, The Internet Society Li Z, Zou D, Xu S, Ou X, Jin H, Wang S, Deng Z, Zhong Y (2018) Vuldeepecker: A deep learning-based system for vulnerability detection. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, The Internet Society
Zurück zum Zitat Maimó LF, Clemente FJG, Pérez MG, Pérez GM (2017). In: On the performance of a deep learning-based anomaly detection system for 5g networks 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017, IEEE, pp 1–8. https://doi.org/10.1109/UIC-ATC.2017.8397440 Maimó LF, Clemente FJG, Pérez MG, Pérez GM (2017). In: On the performance of a deep learning-based anomaly detection system for 5g networks 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017, IEEE, pp 1–8. https://​doi.​org/​10.​1109/​UIC-ATC.​2017.​8397440
Zurück zum Zitat Maurya S, Jain A (2020) Deep learning to combat phishing. Journal of Statistics and Management Systems 6:945–957CrossRef Maurya S, Jain A (2020) Deep learning to combat phishing. Journal of Statistics and Management Systems 6:945–957CrossRef
Zurück zum Zitat McDermott CD Majdani, F, Petrovski A (2018) Botnet detection in the internet of things using deep learning approaches. In: 2018 International Joint Conference on Neural Networks, IJCNN 2018, Rio de Janeiro, Brazil, July 8-13, 2018, IEEE, pp 1–8. https://doi.org/10.1109/IJCNN.2018.8489489 McDermott CD Majdani, F, Petrovski A (2018) Botnet detection in the internet of things using deep learning approaches. In: 2018 International Joint Conference on Neural Networks, IJCNN 2018, Rio de Janeiro, Brazil, July 8-13, 2018, IEEE, pp 1–8. https://​doi.​org/​10.​1109/​IJCNN.​2018.​8489489
Zurück zum Zitat Mendiratta S (2019) It trends and web engineering. In: International Conference on contemporary Computing and Informatics, IC3I 2019, Singapore, December 12-14, 2019, IEEE, pp 179–185 Mendiratta S (2019) It trends and web engineering. In: International Conference on contemporary Computing and Informatics, IC3I 2019, Singapore, December 12-14, 2019, IEEE, pp 179–185
Zurück zum Zitat Michie D, Spiegelhalter DJ, Taylor CC (1994) Machine Learning, Neural and Statistical Classification. Ellis Horwood, ChichesterMATH Michie D, Spiegelhalter DJ, Taylor CC (1994) Machine Learning, Neural and Statistical Classification. Ellis Horwood, ChichesterMATH
Zurück zum Zitat Mnih V, Badia AP, Mirza M, Graves A, Lillicrap TP, Harley T, Silver D, Kavukcuoglu K (2016) Asynchronous methods for deep reinforcement learning. In: Balcan M, Weinberger KQ (eds) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016, JMLR.org, JMLR Workshop and Conference Proceedings, vol 48, pp 1928–1937 Mnih V, Badia AP, Mirza M, Graves A, Lillicrap TP, Harley T, Silver D, Kavukcuoglu K (2016) Asynchronous methods for deep reinforcement learning. In: Balcan M, Weinberger KQ (eds) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016, JMLR.org, JMLR Workshop and Conference Proceedings, vol 48, pp 1928–1937
Zurück zum Zitat Nunes E, Diab A, Gunn AT, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, IEEE, pp 7–12. https://doi.org/10.1109/ISI.2016.7745435 Nunes E, Diab A, Gunn AT, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, IEEE, pp 7–12. https://​doi.​org/​10.​1109/​ISI.​2016.​7745435
Zurück zum Zitat Ouairy L, Le-Bouder H, Lanet J L Zincir-Heywood N, Bonfante G, Debbabi M, Garcia-Alfaro J (eds) (2019) Protection of systems against fuzzing attacks. Springer International Publishing, Cham Ouairy L, Le-Bouder H, Lanet J L Zincir-Heywood N, Bonfante G, Debbabi M, Garcia-Alfaro J (eds) (2019) Protection of systems against fuzzing attacks. Springer International Publishing, Cham
Zurück zum Zitat Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Visaggio G, Baldassarre MT, Linkman SG, Turner M (eds) 12th International Conference on Evaluation and Assessment in Software Engineering, EASE 2008, University of Bari, Italy, 26-27 June 2008, BCS, Workshops in Computing Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Visaggio G, Baldassarre MT, Linkman SG, Turner M (eds) 12th International Conference on Evaluation and Assessment in Software Engineering, EASE 2008, University of Bari, Italy, 26-27 June 2008, BCS, Workshops in Computing
Zurück zum Zitat Preuveneers D, Rimmer V, Tsingenopoulos I, Spooren J, Joosen W, Ilie-Zudor E (2018) Chained anomaly detection models for federated learning: An intrusion detection case study. Applied Sciences 8(12):2663–2683CrossRef Preuveneers D, Rimmer V, Tsingenopoulos I, Spooren J, Joosen W, Ilie-Zudor E (2018) Chained anomaly detection models for federated learning: An intrusion detection case study. Applied Sciences 8(12):2663–2683CrossRef
Zurück zum Zitat Radford A, Metz L, Chintala S (2016) Unsupervised representation learning with deep convolutional generative adversarial networks. In: Bengio Y, LeCun Y (eds) 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings Radford A, Metz L, Chintala S (2016) Unsupervised representation learning with deep convolutional generative adversarial networks. In: Bengio Y, LeCun Y (eds) 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings
Zurück zum Zitat Ronen R, Radu M, Feuerstein C, Yom-Tov E, Ahmadi M (2018) Microsoft malware classification challenge. CoRR abs/1802.10135 Ronen R, Radu M, Feuerstein C, Yom-Tov E, Ahmadi M (2018) Microsoft malware classification challenge. CoRR abs/1802.10135
Zurück zum Zitat Rong C, Gou G, Cui M, Xiong G, Li Z, Guo L Park N, Sun K, Foresti S, Butler K, Saxena N (eds) (2020) Transnet: Unseen malware variants detection using deep transfer learning. Springer International Publishing, Cham Rong C, Gou G, Cui M, Xiong G, Li Z, Guo L Park N, Sun K, Foresti S, Butler K, Saxena N (eds) (2020) Transnet: Unseen malware variants detection using deep transfer learning. Springer International Publishing, Cham
Zurück zum Zitat Roseline SA, Hari G, Geetha S, Krishnamurthy R (2019) Vision-based malware detection and classification using lightweight deep learning paradigm. In: Nain N, Vipparthi SK, Raman B (eds) Computer Vision and Image Processing - 4th International Conference, CVIP 2019, Jaipur, India, September 27-29, 2019, Revised Selected Papers, Part II, Springer, Communications in Computer and Information Science, vol 1148, pp 62–73. https://doi.org/10.1007/978-981-15-4018-9_6 Roseline SA, Hari G, Geetha S, Krishnamurthy R (2019) Vision-based malware detection and classification using lightweight deep learning paradigm. In: Nain N, Vipparthi SK, Raman B (eds) Computer Vision and Image Processing - 4th International Conference, CVIP 2019, Jaipur, India, September 27-29, 2019, Revised Selected Papers, Part II, Springer, Communications in Computer and Information Science, vol 1148, pp 62–73. https://​doi.​org/​10.​1007/​978-981-15-4018-9_​6
Zurück zum Zitat Russell SJ, Norvig P (2020) Artificial Intelligence: A Modern Approach (4th Edition). Pearson, New YorkMATH Russell SJ, Norvig P (2020) Artificial Intelligence: A Modern Approach (4th Edition). Pearson, New YorkMATH
Zurück zum Zitat Shams EA, Rizaner A, Ulusoy AH (2021) A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems. Neural Comput Appl 33(20):13647–13665CrossRef Shams EA, Rizaner A, Ulusoy AH (2021) A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems. Neural Comput Appl 33(20):13647–13665CrossRef
Zurück zum Zitat Sharma B, Mangrulkar R (2019) Deep learning applications in cyber security: a comprehensive review, challenges and prospects. International Journal of Engineering Applied Sciences and Technology 4(8):148–1594CrossRef Sharma B, Mangrulkar R (2019) Deep learning applications in cyber security: a comprehensive review, challenges and prospects. International Journal of Engineering Applied Sciences and Technology 4(8):148–1594CrossRef
Zurück zum Zitat Sharmeen S, Huda S, Abawajy J, assan MM (2020) An adaptive framework against Android privilege escalation threats using deep learning and semi-supervised approaches. Appl Soft Comput 89:106089CrossRef Sharmeen S, Huda S, Abawajy J, assan MM (2020) An adaptive framework against Android privilege escalation threats using deep learning and semi-supervised approaches. Appl Soft Comput 89:106089CrossRef
Zurück zum Zitat Siddiqui S, Khan MS, Ferens K, Kinsner W (2017) Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats. In: Howard N, Wang Y, ussain A, Hamdy F, Widrow B, Zadeh LA (eds) 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, ICCI*CC 2017, Oxford, United Kingdom, July 26-28, 2017, IEEE Computer Society, pp 297–308. https://doi.org/10.1109/ICCI-CC.2017.8109765 Siddiqui S, Khan MS, Ferens K, Kinsner W (2017) Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats. In: Howard N, Wang Y, ussain A, Hamdy F, Widrow B, Zadeh LA (eds) 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, ICCI*CC 2017, Oxford, United Kingdom, July 26-28, 2017, IEEE Computer Society, pp 297–308. https://​doi.​org/​10.​1109/​ICCI-CC.​2017.​8109765
Zurück zum Zitat Taheri S, Salem M, Yuan JS (2018) Leveraging image representation of network traffic data and transfer learning in botnet detection. Big Data and Cognitive Computing 2(4):37CrossRef Taheri S, Salem M, Yuan JS (2018) Leveraging image representation of network traffic data and transfer learning in botnet detection. Big Data and Cognitive Computing 2(4):37CrossRef
Zurück zum Zitat Thamilarasu G, Chawla S (2019) Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9):1977CrossRef Thamilarasu G, Chawla S (2019) Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9):1977CrossRef
Zurück zum Zitat Ullah F, Naeem H, Jabbar S, Khalid S, Latif MA, Al-Turjman FM, Mostarda L (2019) Cyber security threats detection in internet of things using deep learning approach. IEEE Access 7:124379–124389CrossRef Ullah F, Naeem H, Jabbar S, Khalid S, Latif MA, Al-Turjman FM, Mostarda L (2019) Cyber security threats detection in internet of things using deep learning approach. IEEE Access 7:124379–124389CrossRef
Zurück zum Zitat Ussath M, Jaeger D, Cheng F, Meinel C (2017) Identifying suspicious user behavior with neural networks. In: 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017, IEEE Computer Society, pp 255–263. https://doi.org/10.1109/CSCloud.2017.10 Ussath M, Jaeger D, Cheng F, Meinel C (2017) Identifying suspicious user behavior with neural networks. In: 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017, IEEE Computer Society, pp 255–263. https://​doi.​org/​10.​1109/​CSCloud.​2017.​10
Zurück zum Zitat Valliammal N, Shaju B (2018) Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey. International Journal of Advanced Technology and Engineering Exploration 5(49):489–494CrossRef Valliammal N, Shaju B (2018) Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey. International Journal of Advanced Technology and Engineering Exploration 5(49):489–494CrossRef
Zurück zum Zitat Vinayakumar R, Soman K, Prabaharan P, Akarsh S, Elhoseny M (2019d) Deep learning framework for cyber threat situational awareness based on email and url data analysis. Cybersecurity and Secure Information Systems Advanced Sciences and Technologies for Security Applications. https://doi.org/10.1007/978-3-030-16837-7_6 Vinayakumar R, Soman K, Prabaharan P, Akarsh S, Elhoseny M (2019d) Deep learning framework for cyber threat situational awareness based on email and url data analysis. Cybersecurity and Secure Information Systems Advanced Sciences and Technologies for Security Applications. https://​doi.​org/​10.​1007/​978-3-030-16837-7_​6
Zurück zum Zitat Vinayakumar R, Alazab M, Srinivasan S, Pham QV, Padannayil SK, Simran K (2020) A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Transactions on Industry Applications 56(4):4436–4456. https://doi.org/10.1109/TIA.2020.2971952 Vinayakumar R, Alazab M, Srinivasan S, Pham QV, Padannayil SK, Simran K (2020) A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Transactions on Industry Applications 56(4):4436–4456. https://​doi.​org/​10.​1109/​TIA.​2020.​2971952
Zurück zum Zitat Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Shepperd MJ, Hall T, Myrtveit I (eds) 18th International Conference on Evaluation and Assessment in Software Engineering, EASE ’14, London, England, United Kingdom, May 13-14, 2014, ACM, pp 38:1–38:10. https://doi.org/10.1145/2601248.2601268 Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Shepperd MJ, Hall T, Myrtveit I (eds) 18th International Conference on Evaluation and Assessment in Software Engineering, EASE ’14, London, England, United Kingdom, May 13-14, 2014, ACM, pp 38:1–38:10. https://​doi.​org/​10.​1145/​2601248.​2601268
Zurück zum Zitat Wu Y, Schuster M, Chen Z, Le QV, Norouzi M, Macherey W, Krikun M, Cao Y, Gao Q, Macherey K, Klingner J, Shah A, Johnson M, Liu X, Kaiser L, Gouws S, Kato Y, Kudo T, Kazawa H, Stevens K, Kurian G, Patil N, Wang W, Young C, Smith J, Riesa J, Rudnick A, Vinyals O, Corrado G, Hughes M, Dean J (2016) Google’s neural machine translation system: Bridging the gap between human and machine translation. CoRR abs/1609.08144 Wu Y, Schuster M, Chen Z, Le QV, Norouzi M, Macherey W, Krikun M, Cao Y, Gao Q, Macherey K, Klingner J, Shah A, Johnson M, Liu X, Kaiser L, Gouws S, Kato Y, Kudo T, Kazawa H, Stevens K, Kurian G, Patil N, Wang W, Young C, Smith J, Riesa J, Rudnick A, Vinyals O, Corrado G, Hughes M, Dean J (2016) Google’s neural machine translation system: Bridging the gap between human and machine translation. CoRR abs/1609.08144
Zurück zum Zitat Xiong R, Cao J, Yu Q (2018) Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle. Applied Energy 211:538–548CrossRef Xiong R, Cao J, Yu Q (2018) Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle. Applied Energy 211:538–548CrossRef
Zurück zum Zitat Yamin MM, Katt B (2018) Detecting malicious windows commands using natural language processing techniques. In: Lanet J, Toma C (eds) Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers, Springer, Lecture Notes in Computer Science, vol 11359, pp 157–169. https://doi.org/10.1007/978-3-030-12942-2_13 Yamin MM, Katt B (2018) Detecting malicious windows commands using natural language processing techniques. In: Lanet J, Toma C (eds) Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers, Springer, Lecture Notes in Computer Science, vol 11359, pp 157–169. https://​doi.​org/​10.​1007/​978-3-030-12942-2_​13
Zurück zum Zitat Zhao J, Zhao J, Shetty S, Pan J W, Kamhoua C, Kwiat K (2019) Transfer learning for detecting unknown network attacks. EURASIP Journal on Information Security 2019:2510–2523CrossRef Zhao J, Zhao J, Shetty S, Pan J W, Kamhoua C, Kwiat K (2019) Transfer learning for detecting unknown network attacks. EURASIP Journal on Information Security 2019:2510–2523CrossRef
Zurück zum Zitat Zhao Y, Chen J, Guo Q, Teng J, Wu D (2020b) Network anomaly detection using federated learning and transfer learning. In: Yu S, Mueller P, Qian J (eds) Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings, Springer, Communications in Computer and Information Science, vol 1268, pp 219–231. https://doi.org/10.1007/978-981-15-9129-7_16 Zhao Y, Chen J, Guo Q, Teng J, Wu D (2020b) Network anomaly detection using federated learning and transfer learning. In: Yu S, Mueller P, Qian J (eds) Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings, Springer, Communications in Computer and Information Science, vol 1268, pp 219–231. https://​doi.​org/​10.​1007/​978-981-15-9129-7_​16
Metadaten
Titel
Deep learning techniques to detect cybersecurity attacks: a systematic mapping study
verfasst von
Damiano Torre
Frantzy Mesadieu
Anitha Chennamaneni
Publikationsdatum
01.05.2023
Verlag
Springer US
Erschienen in
Empirical Software Engineering / Ausgabe 3/2023
Print ISSN: 1382-3256
Elektronische ISSN: 1573-7616
DOI
https://doi.org/10.1007/s10664-023-10302-1

Weitere Artikel der Ausgabe 3/2023

Empirical Software Engineering 3/2023 Zur Ausgabe

Premium Partner