Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review

Computer Science Review - Tập 39 - Trang 100317 - 2021
Priyanka Dixit1, Sanjay Silakari1
1Department of Computer Science & Engg, University Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal (M.P), India

Tài liệu tham khảo

Armbrust, 2010, A view of cloud computing, Commun. ACM, 53, 50, 10.1145/1721654.1721672 Chen, 2014, Big data: A survey, Mob. Netw. Appl., 19, 171, 10.1007/s11036-013-0489-0 Alrawais, 2017, Fog computing for the internet of things: Security and privacy issues, IEEE Internet Comput., 21, 34, 10.1109/MIC.2017.37 Sundararaj, 2019, Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm, Wirel. Pers. Commun., 104, 173, 10.1007/s11277-018-6014-9 Vinu, 2018, An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks, Comput. Secur., 77, 277, 10.1016/j.cose.2018.04.009 Sundararaj, 2016, An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm, Int. J. Intell. Eng. Syst., 9, 117 Sundararaj, 2019, Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction, Int. J. Biomed. Eng. Technol., 31, 325, 10.1504/IJBET.2019.103242 Sundararaj, 2020, CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system, Prog. Photovolt. Res. Appl., 10.1002/pip.3315 Russell, 2002 Wells, 2014, Cyber-physical security challenges in manufacturing systems, Manuf. Lett., 2, 74, 10.1016/j.mfglet.2014.01.005 Larriva-Novo, 2020, Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies, IEEE Access, 8, 9005, 10.1109/ACCESS.2019.2963407 Hsien-De Huang, . TonTon, Hung-Yu Kao, R2-D2: color-inspired convolutional neural network (CNN)-based android malware detections, in: IEEE International Conference on Big Data, Big Data, 2018, pp. 2633–2642. Mahdavifar, 2019, Application of deep learning to cybersecurity: A survey, Neurocomputing, 347, 149, 10.1016/j.neucom.2019.02.056 Berman, 2019, A survey of deep learning methods for cyber security, Information, 10, 122, 10.3390/info10040122 KP, 2020 Komal Jaswal, . TanupriyaChoudhury, . RoshanLalChhokar, SoorajRandhir Singh, Securing the Internet of Things: A proposed framework, in: IEEE: International Conference on Computing, Communication and Automation, ICCCA, 2017, pp. 1277–1281. Li, 2019, A novel CNN based security guaranteed image watermarking generation scenario for smart city applications, Inform. Sci., 479, 432, 10.1016/j.ins.2018.02.060 Mnih, 2019, Human-level control through deep reinforcement learning, Nature, 518, 529, 10.1038/nature14236 Parekh, 2018, Identifying core concepts of cybersecurity: Results of two delphi processes, IEEE Trans. Educ., 61, 11, 10.1109/TE.2017.2715174 Wu, 2017, Optimal switching integrity attacks in cyber-physical systems, 709 Diro, 2018, Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst., 82, 761, 10.1016/j.future.2017.08.043 Volodymyr Mnih, AdriaPuigdomenechBadia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, KorayKavukcuoglu, Asynchronous methods for deep reinforcement learning, in: International Conference on Machine Learning, 2016, pp. 1928–1937. Radford, 2015 Xiong, 2018, Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle, Appl. Energy, 1, 538, 10.1016/j.apenergy.2017.11.072 Xu, 2019 Katzir, 2020, Gradients cannot be tamed: Behind the impossible paradox of blocking targeted adversarial attacks, IEEE Trans. Neural Netw. Learn. Syst. Mahloujifar, 2019, Learning under p-tampering poisoning attacks, Ann. Math. Artif. Intell., 1 Jiang, 2020, Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles, IEEE Trans. Veh. Technol., 69, 4439, 10.1109/TVT.2020.2977378 Sihag, 2020, Secure estimation under causative attacks, IEEE Trans. Inform. Theory, 10.1109/TIT.2020.2985956 Katzir, 2018, Quantifying the resilience of machine learning classifiers used for cyber security, Expert Syst. Appl., 92, 419, 10.1016/j.eswa.2017.09.053 Li, 2019, A novel CNN based security guaranteed image watermarking generation scenario for smart city applications, Inform. Sci., 479, 432, 10.1016/j.ins.2018.02.060 Li, 2015, A hybrid malicious code detection method based on deep learning, Int. J. Secur. Appl., 9, 205 Ahmed, 2012, Modelling cyber security for software-defined networks those grow strong when exposed to threats, J. Reliab. Intell. Environ., 1, 123 Yaniv Taigman, Ming Yang, Marc Aurelio Ranzato, Lior Wolf, Deepface: Closing the gap to human-level performance in face verification, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1701–1708. Xiong Zhao, Cheng Cheng, Zhou Li, Karlekar Xu, Shen Pranata, Xing, 3D-Aided Deep Pose-Invariant Face Recognition, in: IJCAI, Vol. 2, No. 3, 2018, p. 11. Zhang, 2019, Multi-task and multi-view training for end-to-end relation extraction, Neurocomputing, 4 Yu, 2017, Recent progresses in deep learning based acoustic models, IEEE/CAA J. Autom. Sin., 44, 396, 10.1109/JAS.2017.7510508 Abdel-Hamid, 2014, Exploring convolutional neural network structures and optimization techniques for speech recognition, Interspeech, 11, 73 Alom, 2019, A state-of-the-art survey on deep learning theory and architectures, Electronics, 8, 292, 10.3390/electronics8030292 Zhang, 2020, An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset, Comput. Netw., 10.1016/j.comnet.2020.107315 Xiao, 2020, Malfcs: An effective malware classification framework with automated feature extraction based on deep convolutional neural networks, J. Parallel Distrib. Comput., 10.1016/j.jpdc.2020.03.012 Baldi, Pierre, Auto encoders, unsupervised learning, and deep architectures, in: Proceedings of ICML workshop on unsupervised and transfer learning, 2014, pp. 37–49. Jonathan Masci, Ueli Meier, Dan Ciresan, Schmidhuber, Stacked convolutional auto-encoders for hierarchical feature extraction, in: International Conference on Artificial Neural Networks, 2014, pp. 52–59. Bengio, 2014, Generalized denoising auto-encoders as generative models, 899 Fang, 2019, A deep learning framework for predicting cyber attacks rates, EURASIP J. Inf. Secur., 1 Pu, 2016, Variational auto encoder for deep learning of images, labels and captions, 2352 Mohamed, 2014, Acoustic modelling using deep belief networks, IEEE Trans. Audio Speech Lang. Process., 20, 14, 10.1109/TASL.2011.2109382 Zhang, 2019, A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding, Comput. Secur., 84, 376, 10.1016/j.cose.2019.04.005 Bontupalli Alom, Taha, Intrusion detection using deep belief networks, in: 2015 National Aerospace and Electronics Conference, NAECON, 2015, pp. 339-344. Fiore, 2014, Network anomaly detection with the restricted Boltzmann machine, Neurocomputing, 122, 13 Yang, 2017, Improved traffic detection with support vector machine based on restricted Boltzmann machine, Soft Comput., 21, 3101, 10.1007/s00500-015-1994-9 Zhang, 2019, Intrusion detection for IoT based on improved genetic algorithm and deep belief network, IEEE Access, 7, 31711, 10.1109/ACCESS.2019.2903723 McDaniel Papernot, Swami, Harang, Crafting adversarial input sequences for recurrent neural networks, in: IEEE Military Communications Conference, 2016, pp. 49–54. Razvan Pascanu, Jack Stokes, MadyMarinescu HerminehSanossian, Anil Thomas, Malware classification with recurrent networks, in: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, 2015, pp. 1916–1920. HaddadPajouh, 2018, A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting, Future Gener. Comput. Syst., 85, 88, 10.1016/j.future.2018.03.007 Rosenberg Shabtai, Rokach, Elovici, Generic black-box end-to-end attack against state of the art API call based malware classifiers, in: International Symposium on Research in Attacks, Intrusions, and Defences, 2017, pp. 490–510. Jihyun Kim, Jaehyun Kim, HuongLe Thi Thu, Howon Kim, Long short term memory recurrent neural network classifier for intrusion detection, in: 2016 International Conference on Platform Technology and Service, 2016, pp. 1–5. Sak, 2015 Feng, 2018, A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit, Int. J. Intell. Comput. Cybern., 11, 511, 10.1108/IJICC-06-2017-0066 Yang, 2018 Li, 2018, Anti-steganalysis for image on convolutional neural networks, Multimedia Tools Appl., 1 Dengyu Xiao, Yixiang Huang, Xudong Zhang, Haotian Shi, Chengliang Liu, Yanming Li, Fault diagnosis of asynchronous motors based on LSTM neural network, in: 2018 Prognostics and System Health Management Conference, 2018, pp. 540–545. Niyaz Javaid, Sun, Alam, A deep learning approach for network intrusion detection system, in: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, 2016, pp. 21–26. AkankshaRai Sharma, PranavKaushik, Literature survey of statistical, deep and reinforcement learning in natural language processing, in: IEEE International Conference on Computing, Communication and Automation, ICCCA, 2017, pp. 350–354. Jiang, 2018, Learning intentional communication for multi-agent cooperation, 725, 4 Xiao, 2018 Li, 2017 Li, 2018 Moshe Kravchik, AsafShabtai, Detecting cyber attacks in industrial control systems using convolutional neural networks, in: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, 2018, pp. 72–83. Mamoru Mimura, Hidema Tanaka, Heavy log reader: learning the context of cyber attacks automatically with paragraph vector, in: International Conference on Information Systems Security, 2017, pp. 146–163. Vinayakumar, 2019, Robust intelligent malware detection using deep learning, IEEE Access, 7, 46717, 10.1109/ACCESS.2019.2906934 Vasan, 2020, IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture, Comput. Netw., 171, 10.1016/j.comnet.2020.107138 Vinayakumar, 2019, IEEE Access, 7, 41525, 10.1109/ACCESS.2019.2895334 Chae, 2013, Feature selection for intrusion detection using NSL-KDD, Recent Adv. Comput. Sci., 18, 4 Hatada, 2015, Empowering anti-malware research in Japan by sharing the MWS datasets, J. Inf. Process., 23, 579 J. Song, H. Takakura, Y. Okabe, M. Eto, D. Inoue, K. Nakao, Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation, in: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011, pp. 29–36. Moustafa, 2015, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 1 Panigrahi, 2018, A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems, Int. J. Eng. Technol., 7, 479 Yang, 2017 Meira, 2019, Performance evaluation of unsupervised techniques in cyber-attack anomaly detection, J Amb. Intell. Huma. Comput., 1 Thing, Network anomaly detection and attack classification: A deep learning approah, in: IEEE Wireless Communications and Networking Conference, 2017, pp. 1–6. Lopez-Martin, 2017, Sensors, 17, 1967, 10.3390/s17091967 Du, 2016, Stacked convolutional denoising auto-encoders for feature representation, IEEE Trans. Cybern., 47, 1017, 10.1109/TCYB.2016.2536638 Liu, 2018, A stacked auto encoder-based deep neural network for achieving gearbox fault diagnosis, Math. Probl. Eng. Thanthrige, 2016, Machine learning techniques for intrusion detection on public dataset, 1 Skopik, 2016, A problem shared is a problem halved: A survey on the dimensions of collective cyber defence through security information sharing, Comput. Secur., 60, 154, 10.1016/j.cose.2016.04.003 Wang, 2019, Deep learning aided interval state prediction for improving cyber security in energy internet, Energy, 174, 1292, 10.1016/j.energy.2019.03.009 Thamilarasu, 2019, Towards deep-learning-driven intrusion detection for the internet of things, Sensors, 19 Khaled Alrawashdeh, Carla Purdy, Fast hardware assisted online learning using unsupervised deep learning structure for anomaly detection, in: 2018 International Conference on Information and Computer Technologies, 2018, pp.128-134. Zhang, 2020, A real-time and ubiquitous network attack detection based on deep belief network and support vector machine, IEEE/CAA J. Autom. Sin., 7, 790, 10.1109/JAS.2020.1003099 Nabil, 2019, Deep learning-based detection of electricity theft cyber-attacks in smart grid AMI networks, 73 Lipton, 2015 Young, 2018, Recent trends in deep learning based natural language processing, IEEE Comput. Intell. Mag., 13, 55, 10.1109/MCI.2018.2840738 Nguyen, 2019 Salehinejad, 2017 Venkatraman, 2019, A hybrid deep learning image-based analysis for effective malware detection, J. Inf. Secur. Appl., 47, 377 Raybourn, 2018, A zero-entry cyber range environment for future learning ecosystem, 93 Darlow, 2018 Allen, 2018, Reward-based Monte Carlo-Bayesian reinforcement learning for cyber preventive maintenance, Comput. Ind. Eng., 126, 578, 10.1016/j.cie.2018.09.051 Aidin Ferdowsi, Ursula Challita, WalidSaad, Narayan B. Mandalay, Robust deep reinforcement learning for security and safety in autonomous vehicle systems, in: IEEE International Conference on Intelligent Transportation Systems, ITSC, 2018, pp.307–312. Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, Fei Fang, Deep reinforcement learning for green security game with online information, in: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, 2018. Lin, 2018 Balakrishnan, 2019, Deep belief network enhanced intrusion detection system to prevent security breach in the internet of things, Internet Things, 10.1016/j.iot.2019.100112 SujitRokka Chhetri, Anthony Bahadir Lopez, Jiang Wan, Mohammad Abdullah Al Faruque, GAN-Sec: Generative adversarial network modelling for the security analysis of cyber-physical production systems. IEEE: Automation and Test in Europe Conference and Exhibition, DATE, 2019, pp. 770–775. Chuanlong Yin, Yuefei Zhu, Shengli Liu, JinlongFei, He tong Zhang, An enhancing framework for bonnet detection using generative adversarial networks, in: 2018 International Conference on Artificial Intelligence and Big Data, 2018, pp 228–234.