A survey of large language models for cyber threat detection☆

被引:10
|
作者
Chen, Yiren [1 ,2 ]
Cui, Mengjiao [1 ,2 ]
Wang, Ding [1 ,2 ]
Cao, Yiyang [1 ,2 ]
Yang, Peian [1 ,2 ]
Jiang, Bo [1 ,2 ]
Lu, Zhigang [1 ,2 ]
Liu, Baoxu [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Large language models; Cyber security; Threat detection; Literature review;
D O I
10.1016/j.cose.2024.104016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing complexity of cyber threats and the expanding scope of cyberspace, there exist progressively more challenges in cyber threat detection. It is proven that most previous threat detection models may become inadequate due to the escalation of hacker attacks. However, recent research has shown that some of these problems can be effectively addressed by Large Language Models (LLMs) directly or indirectly. Nowadays, a growing number of security researchers are adopting LLMs for analyzing various cyber threats. According to the investigation, we found that while there are numerous emerging reviews on the utilization of LLMs in some fields of cyber security, there is currently a lack of a comprehensive review on the application of LLMs in the threat detection stage. Through retrieving and collating existing works in recent years, we examined various threat detection and monitoring tasks for which LLMs may be well-suited, including cyber threat intelligence, phishing email detection, threat prediction, logs analysis, and so on. Additionally, the review explored the specific stages of different detection tasks in which LLMs are involved, evaluating the points at which LLMs are optimized. For instance, LLMs have been found to enhance the interpretability of log analysis in real-time anomaly event discovery. Additionally, we discussed some tasks where LLMs may not be suitable and explored future directions and challenges in this field. By providing a detailed status update and comprehensive insights, this review aims to assist security researchers in leveraging LLMs to enhance existing detection frameworks or develop domain-specific LLMs.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Cyber Threat Trees for Large System Threat Cataloging and Analysis
    Ongsakorn, P.
    Turney, K.
    Thornton, M.
    Nair, S.
    Szygenda, S.
    Manikas, T.
    2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 610 - 615
  • [32] Cyber Threat Detection and Application Analysis
    Yang, Shuangmao
    Wang, Ji
    Zhang, Jing
    Li, Hao
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 46 - 49
  • [33] Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation
    Sultana, Madeena
    Taylor, Adrian
    Li, Li
    Majumdar, Suryadipta
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [34] Risk and Response in Large Language Models: Evaluating Key Threat Categories
    Harandizadeh, Bahareh
    Salinas, Abel
    Morstatter, Fred
    arXiv,
  • [35] Semantic anomaly detection with large language models
    Amine Elhafsi
    Rohan Sinha
    Christopher Agia
    Edward Schmerling
    Issa A. D. Nesnas
    Marco Pavone
    Autonomous Robots, 2023, 47 : 1035 - 1055
  • [36] Semantic anomaly detection with large language models
    Elhafsi, Amine
    Sinha, Rohan
    Agia, Christopher
    Schmerling, Edward
    Nesnas, Issa A. D.
    Pavone, Marco
    AUTONOMOUS ROBOTS, 2023, 47 (08) : 1035 - 1055
  • [37] Finetuning Large Language Models for Vulnerability Detection
    Shestov, Aleksei
    Levichev, Rodion
    Mussabayev, Ravil
    Maslov, Evgeny
    Zadorozhny, Pavel
    Cheshkov, Anton
    Mussabayev, Rustam
    Toleu, Alymzhan
    Tolegen, Gulmira
    Krassovitskiy, Alexander
    IEEE ACCESS, 2025, 13 : 38889 - 38900
  • [38] Detection avoidance techniques for large language models
    Schneider, Sinclair
    Steuber, Florian
    Schneider, Joao A. G.
    Rodosek, Gabi Dreo
    DATA & POLICY, 2025, 7
  • [39] Large-Scale Analysis of Continuous Data in Cyber-Warfare Threat Detection
    Acosta, William
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 317 - 319
  • [40] Security and Privacy Challenges of Large Language Models: A Survey
    Das, Badhan chandra
    Amini, M. hadi
    Wu, Yanzhao
    ACM COMPUTING SURVEYS, 2025, 57 (06)