Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

被引:2
|
作者
Torre, Damiano [1 ]
Mesadieu, Frantzy [1 ]
Chennamaneni, Anitha [1 ]
机构
[1] Texas A&M Univ Cent Texas, Dept Comp Informat Syst, 1001 Leadership Pl, Killeen, TX 76549 USA
关键词
Deep learning; Cybersecurity; Systematic mapping study; Systematic review; NETWORK INTRUSION DETECTION; ANOMALY DETECTION; CYBER-SECURITY; FRAMEWORK; IDENTIFICATION; AUTOENCODER; STRATEGY; SVM;
D O I
10.1007/s10664-023-10302-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextRecent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.ObjectiveTo deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.MethodWe conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.ResultsFrom an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.ConclusionsWe provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.
引用
收藏
页数:71
相关论文
共 50 条
  • [21] Safety and Cybersecurity Assessment Techniques for Critical Industries: A Mapping Study
    Babeshko, Ievgen
    Di Giandomenico, Felicita
    IEEE ACCESS, 2023, 11 : 83781 - 83793
  • [22] Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
    Ali, Adnan Bin Amanat
    Ayyasamy, Ramesh Kumar
    Akbar, Rehan
    Jebna, Abdulkarim Kanaan
    Adnan, Kiran
    SAGE OPEN, 2025, 15 (01):
  • [23] Machine learning techniques applied to detect cyber attacks on web applications
    Choras, Michal
    Kozik, Rafal
    LOGIC JOURNAL OF THE IGPL, 2015, 23 (01) : 45 - 56
  • [24] A COMPREHENSIVE IDS TO DETECT BOTNET ATTACKS USING MACHINE LEARNING TECHNIQUES
    Alghamdi, Abdullah
    Barsoum, Ayad
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [25] Applying Machine Learning Techniques to Detect and Analyze Web Phishing Attacks
    Cuzzocrea, Alfredo
    Martinelli, Fabio
    Mercaldo, Francesco
    IIWAS2018: THE 20TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2014, : 355 - 359
  • [26] Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey
    Alrehan, Alia Mohammed
    Al-Haidari, Fahd
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [27] Comparative analysis and evaluation of the application of deep learning techniques to cybersecurity datasets
    Larriva-Novo, Xavier
    Vega-Barbas, Mario
    Villagra, Victor
    Berrocal, Julio
    DYNA, 2021, 96 (05): : 528 - 533
  • [28] Enhancing cybersecurity against ransomware attacks using LSTM deep learning method: A case study on android devices
    Karaca, Hatice
    Tekerek, Adem
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024,
  • [29] Imbalanced data preprocessing techniques for machine learning: a systematic mapping study
    Vitor Werner de Vargas
    Jorge Arthur Schneider Aranda
    Ricardo dos Santos Costa
    Paulo Ricardo da Silva Pereira
    Jorge Luis Victória Barbosa
    Knowledge and Information Systems, 2023, 65 : 31 - 57
  • [30] Imbalanced data preprocessing techniques for machine learning: a systematic mapping study
    de Vargas, Vitor Werner
    Schneider Aranda, Jorge Arthur
    Costa, Ricardo dos Santos
    da Silva Pereira, Paulo Ricardo
    Victoria Barbosa, Jorge Luis
    KNOWLEDGE AND INFORMATION SYSTEMS, 2023, 65 (01) : 31 - 57