Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

被引:2
|
作者
Torre, Damiano [1 ]
Mesadieu, Frantzy [1 ]
Chennamaneni, Anitha [1 ]
机构
[1] Texas A&M Univ Cent Texas, Dept Comp Informat Syst, 1001 Leadership Pl, Killeen, TX 76549 USA
关键词
Deep learning; Cybersecurity; Systematic mapping study; Systematic review; NETWORK INTRUSION DETECTION; ANOMALY DETECTION; CYBER-SECURITY; FRAMEWORK; IDENTIFICATION; AUTOENCODER; STRATEGY; SVM;
D O I
10.1007/s10664-023-10302-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextRecent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and automate the detection and mitigation of a wide variety of cybersecurity attacks with superior results. However, no systematic study exists that summarizes these DL techniques since most studies are informal literature surveys or focus on different subjects.ObjectiveTo deliver a comprehensive and systematic summary of the existing DL techniques used to detect cybersecurity attacks as they are described in the literature. To identify open challenges for future research.MethodWe conducted a systematic mapping study about DL techniques to detect cybersecurity attacks driven by eleven research questions. We followed existing guidelines when defining our research protocol to increase the repeatability and reliability of our results.ResultsFrom an initial set of 1839 papers, we identified 116 relevant primary studies, primarily published in the last three years. We investigated multiple aspects of the DL techniques, such as the cybersecurity attack types to detect, their application domains, the programming languages, libraries, operating systems, and frameworks used to implement the DL techniques, the datasets used to train the DL models, the types of research carried out (academic or industrial), the performance of the techniques, and the advantages and disadvantages of each technique. We present a new taxonomy comprising 36 different DL techniques. We identified 14 application domains, eight cybersecurity attacks, and 93 publicly available datasets, among other results.ConclusionsWe provide six lessons learned along with recommendations for future research directions. The most active research areas in DL techniques for the identification of cybersecurity attacks discuss CNN and LSTM techniques. DL techniques in cybersecurity is a rapidly growing and developing research area, with many open challenges, including the lack of (a) research conducted in industrial settings, (b) real-time datasets, (c) studies focusing on promising DL techniques and relevant cybersecurity attacks.
引用
收藏
页数:71
相关论文
共 50 条
  • [31] Machine Learning Techniques for Code Smells Detection: A Systematic Mapping Study
    Caram, Frederico Luiz
    De Oliveira Rodrigues, Bruno Rafael
    Campanelli, Amadeu Silveira
    Parreiras, Fernando Silva
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (02) : 285 - 316
  • [32] Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
    Sokolov, S. A.
    Iliev, T. B.
    Stoyanov, I. S.
    2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, : 441 - 446
  • [33] Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
    Macas, Mayra
    Wu, Chunming
    Fuertes, Walter
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [34] An Application to Detect Cyberbullying Using Machine Learning and Deep Learning Techniques
    Raj M.
    Singh S.
    Solanki K.
    Selvanambi R.
    SN Computer Science, 3 (5)
  • [35] Multiclassification of DDoS attacks using machine and deep learning techniques
    Bhatia, Rashmi
    Sharma, Rohini
    International Journal of Security and Networks, 2024, 19 (02) : 63 - 76
  • [36] Investigation of Machine and Deep Learning Techniques to Detect HPV Status
    Petrou, Efstathia
    Chatzipapas, Konstantinos
    Papadimitroulas, Panagiotis
    Andrade-Miranda, Gustavo
    Katsakiori, Paraskevi F.
    Papathanasiou, Nikolaos D.
    Visvikis, Dimitris
    Kagadis, George C.
    JOURNAL OF PERSONALIZED MEDICINE, 2024, 14 (07):
  • [37] A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN
    Zhang, Ming
    Xu, Boyi
    Bai, Shuai
    Lu, Shuaibing
    Lin, Zhechao
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 828 - 836
  • [38] New deep learning method to detect code injection attacks on hybrid applications
    Yan, Ruibo
    Xiao, Xi
    Hu, Guangwu
    Peng, Sancheng
    Jiang, Yong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 67 - 77
  • [39] Deep learning approaches for detecting DDoS attacks: a systematic review
    Mittal, Meenakshi
    Kumar, Krishan
    Behal, Sunny
    SOFT COMPUTING, 2023, 27 (18) : 13039 - 13075
  • [40] Deep learning approaches for detecting DDoS attacks: a systematic review
    Meenakshi Mittal
    Krishan Kumar
    Sunny Behal
    Soft Computing, 2023, 27 : 13039 - 13075