A Review of Computer Vision Methods in Network Security
- URL: http://arxiv.org/abs/2005.03318v1
- Date: Thu, 7 May 2020 08:29:11 GMT
- Title: A Review of Computer Vision Methods in Network Security
- Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne
- Abstract summary: Network security has become an area of significant importance more than ever.
Traditional machine learning methods have been frequently used in the context of network security.
Recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks.
- Score: 11.380790116533912
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Network security has become an area of significant importance more than ever
as highlighted by the eye-opening numbers of data breaches, attacks on critical
infrastructure, and malware/ransomware/cryptojacker attacks that are reported
almost every day. Increasingly, we are relying on networked infrastructure and
with the advent of IoT, billions of devices will be connected to the internet,
providing attackers with more opportunities to exploit. Traditional machine
learning methods have been frequently used in the context of network security.
However, such methods are more based on statistical features extracted from
sources such as binaries, emails, and packet flows.
On the other hand, recent years witnessed a phenomenal growth in computer
vision mainly driven by the advances in the area of convolutional neural
networks. At a glance, it is not trivial to see how computer vision methods are
related to network security. Nonetheless, there is a significant amount of work
that highlighted how methods from computer vision can be applied in network
security for detecting attacks or building security solutions. In this paper,
we provide a comprehensive survey of such work under three topics; i) phishing
attempt detection, ii) malware detection, and iii) traffic anomaly detection.
Next, we review a set of such commercial products for which public information
is available and explore how computer vision methods are effectively used in
those products. Finally, we discuss existing research gaps and future research
directions, especially focusing on how network security research community and
the industry can leverage the exponential growth of computer vision methods to
build much secure networked systems.
Related papers
- A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes [1.3631461603291568]
Generative Adversarial Networks (GANs) have emerged as powerful solutions for addressing the constantly changing security issues.
This survey studies the significance of the deep learning model, precisely on GANs, in strengthening cybersecurity defenses.
The focus is to examine how GANs can be influential tools to strengthen cybersecurity defenses in these domains.
arXiv Detail & Related papers (2024-07-11T19:51:48Z) - Advancing Security in AI Systems: A Novel Approach to Detecting
Backdoors in Deep Neural Networks [3.489779105594534]
backdoors can be exploited by malicious actors on deep neural networks (DNNs) and cloud services for data processing.
Our approach leverages advanced tensor decomposition algorithms to meticulously analyze the weights of pre-trained DNNs and distinguish between backdoored and clean models.
This advancement enhances the security of deep learning and AI in networked systems, providing essential cybersecurity against evolving threats in emerging technologies.
arXiv Detail & Related papers (2024-03-13T03:10:11Z) - Utilizing Deep Learning for Enhancing Network Resilience in Finance [0.0]
This paper uses deep learning for advanced threat detection to improve protective measures in the financial industry.
The detection technology mainly uses statistical machine learning methods.
arXiv Detail & Related papers (2024-02-15T09:35:57Z) - Forensic Data Analytics for Anomaly Detection in Evolving Networks [13.845204373507016]
Many cybercrimes and attacks have been launched in evolving networks to perform malicious activities.
This chapter presents a digital analytics framework for network anomaly detection.
Experiments on real-world evolving network data show the effectiveness of the proposed forensic data analytics solution.
arXiv Detail & Related papers (2023-08-17T20:09:33Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Firearm Detection and Segmentation Using an Ensemble of Semantic Neural
Networks [62.997667081978825]
We present a weapon detection system based on an ensemble of semantic Convolutional Neural Networks.
A set of simpler neural networks dedicated to specific tasks requires less computational resources and can be trained in parallel.
The overall output of the system given by the aggregation of the outputs of individual networks can be tuned by a user to trade-off false positives and false negatives.
arXiv Detail & Related papers (2020-02-11T13:58:16Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.