Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Tài liệu tham khảo
Armbrust, 2010, A view of cloud computing, Commun. ACM, 53, 50, 10.1145/1721654.1721672
Chen, 2014, Big data: A survey, Mob. Netw. Appl., 19, 171, 10.1007/s11036-013-0489-0
Alrawais, 2017, Fog computing for the internet of things: Security and privacy issues, IEEE Internet Comput., 21, 34, 10.1109/MIC.2017.37
Sundararaj, 2019, Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm, Wirel. Pers. Commun., 104, 173, 10.1007/s11277-018-6014-9
Vinu, 2018, An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks, Comput. Secur., 77, 277, 10.1016/j.cose.2018.04.009
Sundararaj, 2016, An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm, Int. J. Intell. Eng. Syst., 9, 117
Sundararaj, 2019, Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction, Int. J. Biomed. Eng. Technol., 31, 325, 10.1504/IJBET.2019.103242
Sundararaj, 2020, CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system, Prog. Photovolt. Res. Appl., 10.1002/pip.3315
Russell, 2002
Wells, 2014, Cyber-physical security challenges in manufacturing systems, Manuf. Lett., 2, 74, 10.1016/j.mfglet.2014.01.005
Larriva-Novo, 2020, Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies, IEEE Access, 8, 9005, 10.1109/ACCESS.2019.2963407
Hsien-De Huang, . TonTon, Hung-Yu Kao, R2-D2: color-inspired convolutional neural network (CNN)-based android malware detections, in: IEEE International Conference on Big Data, Big Data, 2018, pp. 2633–2642.
Mahdavifar, 2019, Application of deep learning to cybersecurity: A survey, Neurocomputing, 347, 149, 10.1016/j.neucom.2019.02.056
Berman, 2019, A survey of deep learning methods for cyber security, Information, 10, 122, 10.3390/info10040122
KP, 2020
Komal Jaswal, . TanupriyaChoudhury, . RoshanLalChhokar, SoorajRandhir Singh, Securing the Internet of Things: A proposed framework, in: IEEE: International Conference on Computing, Communication and Automation, ICCCA, 2017, pp. 1277–1281.
Li, 2019, A novel CNN based security guaranteed image watermarking generation scenario for smart city applications, Inform. Sci., 479, 432, 10.1016/j.ins.2018.02.060
Mnih, 2019, Human-level control through deep reinforcement learning, Nature, 518, 529, 10.1038/nature14236
Parekh, 2018, Identifying core concepts of cybersecurity: Results of two delphi processes, IEEE Trans. Educ., 61, 11, 10.1109/TE.2017.2715174
Wu, 2017, Optimal switching integrity attacks in cyber-physical systems, 709
Diro, 2018, Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst., 82, 761, 10.1016/j.future.2017.08.043
Volodymyr Mnih, AdriaPuigdomenechBadia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, KorayKavukcuoglu, Asynchronous methods for deep reinforcement learning, in: International Conference on Machine Learning, 2016, pp. 1928–1937.
Radford, 2015
Xiong, 2018, Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle, Appl. Energy, 1, 538, 10.1016/j.apenergy.2017.11.072
Xu, 2019
Katzir, 2020, Gradients cannot be tamed: Behind the impossible paradox of blocking targeted adversarial attacks, IEEE Trans. Neural Netw. Learn. Syst.
Mahloujifar, 2019, Learning under p-tampering poisoning attacks, Ann. Math. Artif. Intell., 1
Jiang, 2020, Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles, IEEE Trans. Veh. Technol., 69, 4439, 10.1109/TVT.2020.2977378
Sihag, 2020, Secure estimation under causative attacks, IEEE Trans. Inform. Theory, 10.1109/TIT.2020.2985956
Katzir, 2018, Quantifying the resilience of machine learning classifiers used for cyber security, Expert Syst. Appl., 92, 419, 10.1016/j.eswa.2017.09.053
Li, 2019, A novel CNN based security guaranteed image watermarking generation scenario for smart city applications, Inform. Sci., 479, 432, 10.1016/j.ins.2018.02.060
Li, 2015, A hybrid malicious code detection method based on deep learning, Int. J. Secur. Appl., 9, 205
Ahmed, 2012, Modelling cyber security for software-defined networks those grow strong when exposed to threats, J. Reliab. Intell. Environ., 1, 123
Yaniv Taigman, Ming Yang, Marc Aurelio Ranzato, Lior Wolf, Deepface: Closing the gap to human-level performance in face verification, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1701–1708.
Xiong Zhao, Cheng Cheng, Zhou Li, Karlekar Xu, Shen Pranata, Xing, 3D-Aided Deep Pose-Invariant Face Recognition, in: IJCAI, Vol. 2, No. 3, 2018, p. 11.
Zhang, 2019, Multi-task and multi-view training for end-to-end relation extraction, Neurocomputing, 4
Yu, 2017, Recent progresses in deep learning based acoustic models, IEEE/CAA J. Autom. Sin., 44, 396, 10.1109/JAS.2017.7510508
Abdel-Hamid, 2014, Exploring convolutional neural network structures and optimization techniques for speech recognition, Interspeech, 11, 73
Alom, 2019, A state-of-the-art survey on deep learning theory and architectures, Electronics, 8, 292, 10.3390/electronics8030292
Zhang, 2020, An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset, Comput. Netw., 10.1016/j.comnet.2020.107315
Xiao, 2020, Malfcs: An effective malware classification framework with automated feature extraction based on deep convolutional neural networks, J. Parallel Distrib. Comput., 10.1016/j.jpdc.2020.03.012
Baldi, Pierre, Auto encoders, unsupervised learning, and deep architectures, in: Proceedings of ICML workshop on unsupervised and transfer learning, 2014, pp. 37–49.
Jonathan Masci, Ueli Meier, Dan Ciresan, Schmidhuber, Stacked convolutional auto-encoders for hierarchical feature extraction, in: International Conference on Artificial Neural Networks, 2014, pp. 52–59.
Bengio, 2014, Generalized denoising auto-encoders as generative models, 899
Fang, 2019, A deep learning framework for predicting cyber attacks rates, EURASIP J. Inf. Secur., 1
Pu, 2016, Variational auto encoder for deep learning of images, labels and captions, 2352
Mohamed, 2014, Acoustic modelling using deep belief networks, IEEE Trans. Audio Speech Lang. Process., 20, 14, 10.1109/TASL.2011.2109382
Zhang, 2019, A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding, Comput. Secur., 84, 376, 10.1016/j.cose.2019.04.005
Bontupalli Alom, Taha, Intrusion detection using deep belief networks, in: 2015 National Aerospace and Electronics Conference, NAECON, 2015, pp. 339-344.
Fiore, 2014, Network anomaly detection with the restricted Boltzmann machine, Neurocomputing, 122, 13
Yang, 2017, Improved traffic detection with support vector machine based on restricted Boltzmann machine, Soft Comput., 21, 3101, 10.1007/s00500-015-1994-9
Zhang, 2019, Intrusion detection for IoT based on improved genetic algorithm and deep belief network, IEEE Access, 7, 31711, 10.1109/ACCESS.2019.2903723
McDaniel Papernot, Swami, Harang, Crafting adversarial input sequences for recurrent neural networks, in: IEEE Military Communications Conference, 2016, pp. 49–54.
Razvan Pascanu, Jack Stokes, MadyMarinescu HerminehSanossian, Anil Thomas, Malware classification with recurrent networks, in: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, 2015, pp. 1916–1920.
HaddadPajouh, 2018, A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting, Future Gener. Comput. Syst., 85, 88, 10.1016/j.future.2018.03.007
Rosenberg Shabtai, Rokach, Elovici, Generic black-box end-to-end attack against state of the art API call based malware classifiers, in: International Symposium on Research in Attacks, Intrusions, and Defences, 2017, pp. 490–510.
Jihyun Kim, Jaehyun Kim, HuongLe Thi Thu, Howon Kim, Long short term memory recurrent neural network classifier for intrusion detection, in: 2016 International Conference on Platform Technology and Service, 2016, pp. 1–5.
Sak, 2015
Feng, 2018, A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit, Int. J. Intell. Comput. Cybern., 11, 511, 10.1108/IJICC-06-2017-0066
Yang, 2018
Li, 2018, Anti-steganalysis for image on convolutional neural networks, Multimedia Tools Appl., 1
Dengyu Xiao, Yixiang Huang, Xudong Zhang, Haotian Shi, Chengliang Liu, Yanming Li, Fault diagnosis of asynchronous motors based on LSTM neural network, in: 2018 Prognostics and System Health Management Conference, 2018, pp. 540–545.
Niyaz Javaid, Sun, Alam, A deep learning approach for network intrusion detection system, in: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, 2016, pp. 21–26.
AkankshaRai Sharma, PranavKaushik, Literature survey of statistical, deep and reinforcement learning in natural language processing, in: IEEE International Conference on Computing, Communication and Automation, ICCCA, 2017, pp. 350–354.
Jiang, 2018, Learning intentional communication for multi-agent cooperation, 725, 4
Xiao, 2018
Li, 2017
Li, 2018
Moshe Kravchik, AsafShabtai, Detecting cyber attacks in industrial control systems using convolutional neural networks, in: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, 2018, pp. 72–83.
Mamoru Mimura, Hidema Tanaka, Heavy log reader: learning the context of cyber attacks automatically with paragraph vector, in: International Conference on Information Systems Security, 2017, pp. 146–163.
Vinayakumar, 2019, Robust intelligent malware detection using deep learning, IEEE Access, 7, 46717, 10.1109/ACCESS.2019.2906934
Vasan, 2020, IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture, Comput. Netw., 171, 10.1016/j.comnet.2020.107138
Vinayakumar, 2019, IEEE Access, 7, 41525, 10.1109/ACCESS.2019.2895334
Chae, 2013, Feature selection for intrusion detection using NSL-KDD, Recent Adv. Comput. Sci., 18, 4
Hatada, 2015, Empowering anti-malware research in Japan by sharing the MWS datasets, J. Inf. Process., 23, 579
J. Song, H. Takakura, Y. Okabe, M. Eto, D. Inoue, K. Nakao, Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation, in: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011, pp. 29–36.
Moustafa, 2015, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 1
Panigrahi, 2018, A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems, Int. J. Eng. Technol., 7, 479
Yang, 2017
Meira, 2019, Performance evaluation of unsupervised techniques in cyber-attack anomaly detection, J Amb. Intell. Huma. Comput., 1
Thing, Network anomaly detection and attack classification: A deep learning approah, in: IEEE Wireless Communications and Networking Conference, 2017, pp. 1–6.
Lopez-Martin, 2017, Sensors, 17, 1967, 10.3390/s17091967
Du, 2016, Stacked convolutional denoising auto-encoders for feature representation, IEEE Trans. Cybern., 47, 1017, 10.1109/TCYB.2016.2536638
Liu, 2018, A stacked auto encoder-based deep neural network for achieving gearbox fault diagnosis, Math. Probl. Eng.
Thanthrige, 2016, Machine learning techniques for intrusion detection on public dataset, 1
Skopik, 2016, A problem shared is a problem halved: A survey on the dimensions of collective cyber defence through security information sharing, Comput. Secur., 60, 154, 10.1016/j.cose.2016.04.003
Wang, 2019, Deep learning aided interval state prediction for improving cyber security in energy internet, Energy, 174, 1292, 10.1016/j.energy.2019.03.009
Thamilarasu, 2019, Towards deep-learning-driven intrusion detection for the internet of things, Sensors, 19
Khaled Alrawashdeh, Carla Purdy, Fast hardware assisted online learning using unsupervised deep learning structure for anomaly detection, in: 2018 International Conference on Information and Computer Technologies, 2018, pp.128-134.
Zhang, 2020, A real-time and ubiquitous network attack detection based on deep belief network and support vector machine, IEEE/CAA J. Autom. Sin., 7, 790, 10.1109/JAS.2020.1003099
Nabil, 2019, Deep learning-based detection of electricity theft cyber-attacks in smart grid AMI networks, 73
Lipton, 2015
Young, 2018, Recent trends in deep learning based natural language processing, IEEE Comput. Intell. Mag., 13, 55, 10.1109/MCI.2018.2840738
Nguyen, 2019
Salehinejad, 2017
Venkatraman, 2019, A hybrid deep learning image-based analysis for effective malware detection, J. Inf. Secur. Appl., 47, 377
Raybourn, 2018, A zero-entry cyber range environment for future learning ecosystem, 93
Darlow, 2018
Allen, 2018, Reward-based Monte Carlo-Bayesian reinforcement learning for cyber preventive maintenance, Comput. Ind. Eng., 126, 578, 10.1016/j.cie.2018.09.051
Aidin Ferdowsi, Ursula Challita, WalidSaad, Narayan B. Mandalay, Robust deep reinforcement learning for security and safety in autonomous vehicle systems, in: IEEE International Conference on Intelligent Transportation Systems, ITSC, 2018, pp.307–312.
Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, Fei Fang, Deep reinforcement learning for green security game with online information, in: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, 2018.
Lin, 2018
Balakrishnan, 2019, Deep belief network enhanced intrusion detection system to prevent security breach in the internet of things, Internet Things, 10.1016/j.iot.2019.100112
SujitRokka Chhetri, Anthony Bahadir Lopez, Jiang Wan, Mohammad Abdullah Al Faruque, GAN-Sec: Generative adversarial network modelling for the security analysis of cyber-physical production systems. IEEE: Automation and Test in Europe Conference and Exhibition, DATE, 2019, pp. 770–775.
Chuanlong Yin, Yuefei Zhu, Shengli Liu, JinlongFei, He tong Zhang, An enhancing framework for bonnet detection using generative adversarial networks, in: 2018 International Conference on Artificial Intelligence and Big Data, 2018, pp 228–234.
