Artificial Neural Network for Cybersecurity: A Comprehensive Review
- URL: http://arxiv.org/abs/2107.01185v1
- Date: Sun, 20 Jun 2021 09:32:48 GMT
- Title: Artificial Neural Network for Cybersecurity: A Comprehensive Review
- Authors: Prajoy Podder, Subrato Bharati, M. Rubaiyat Hossain Mondal, Pinto
Kumar Paul, Utku Kose
- Abstract summary: This paper provides a systematic review of the application of deep learning (DL) approaches for cybersecurity.
A discussion is provided on the currently prevailing cyber-attacks in IoT and other networks, and the effectiveness of DL methods to manage these attacks.
Finally, this article discusses the importance of cybersecurity for reliable and practicable IoT-driven healthcare systems.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cybersecurity is a very emerging field that protects systems, networks, and
data from digital attacks. With the increase in the scale of the Internet and
the evolution of cyber attacks, developing novel cybersecurity tools has become
important, particularly for Internet of things (IoT) networks. This paper
provides a systematic review of the application of deep learning (DL)
approaches for cybersecurity. This paper provides a short description of DL
methods which is used in cybersecurity, including deep belief networks,
generative adversarial networks, recurrent neural networks, and others. Next,
we illustrate the differences between shallow learning and DL. Moreover, a
discussion is provided on the currently prevailing cyber-attacks in IoT and
other networks, and the effectiveness of DL methods to manage these attacks.
Besides, this paper describes studies that highlight the DL technique,
cybersecurity applications, and the source of datasets. Next, a discussion is
provided on the feasibility of DL systems for malware detection and
classification, intrusion detection, and other frequent cyber-attacks,
including identifying file type, spam, and network traffic. Our review
indicates that high classification accuracy of 99.72% is obtained by restricted
Boltzmann machine (RBM) when applied to a custom dataset, while long short-term
memory (LSTM) achieves an accuracy of 99.80% for KDD Cup 99 dataset. Finally,
this article discusses the importance of cybersecurity for reliable and
practicable IoT-driven healthcare systems.
Related papers
- A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes [1.3631461603291568]
Generative Adversarial Networks (GANs) have emerged as powerful solutions for addressing the constantly changing security issues.
This survey studies the significance of the deep learning model, precisely on GANs, in strengthening cybersecurity defenses.
The focus is to examine how GANs can be influential tools to strengthen cybersecurity defenses in these domains.
arXiv Detail & Related papers (2024-07-11T19:51:48Z) - Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning [1.0678175996321808]
The Internet of Things (IoT) has been introduced as a breakthrough technology that integrates intelligence into everyday objects.
As the IoT networks grow and expand, they become more susceptible to cybersecurity attacks.
This paper introduces a novel intrusion detection approach designed to address these challenges.
arXiv Detail & Related papers (2024-06-04T06:30:22Z) - X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System [2.556190321164248]
Using machine learning (ML) and deep learning (DL) models in Intrusion Detection Systems has led to a trust deficit due to their non-transparent decision-making.
This paper introduces a novel Explainable IDS approach, called X-CBA, that leverages the structural advantages of Graph Neural Networks (GNNs) to effectively process network traffic data.
Our approach achieves high accuracy with 99.47% in threat detection and provides clear, actionable explanations of its analytical outcomes.
arXiv Detail & Related papers (2024-02-01T18:29:16Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - XFedHunter: An Explainable Federated Learning Framework for Advanced
Persistent Threat Detection in SDN [0.0]
This work proposes XFedHunter, an explainable federated learning framework for APT detection in Software-Defined Networking (SDN)
In XFedHunter, Graph Neural Network (GNN) and Deep Learning model are utilized to reveal the malicious events effectively.
The experimental results on NF-ToN-IoT and DARPA TCE3 datasets indicate that our framework can enhance the trust and accountability of ML-based systems.
arXiv Detail & Related papers (2023-09-15T15:44:09Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Downlink Power Allocation in Massive MIMO via Deep Learning: Adversarial
Attacks and Training [62.77129284830945]
This paper considers a regression problem in a wireless setting and shows that adversarial attacks can break the DL-based approach.
We also analyze the effectiveness of adversarial training as a defensive technique in adversarial settings and show that the robustness of DL-based wireless system against attacks improves significantly.
arXiv Detail & Related papers (2022-06-14T04:55:11Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Review: Deep Learning Methods for Cybersecurity and Intrusion Detection
Systems [6.459380657702644]
Artificial Intelligence (AI) and Machine Learning (ML) can be leveraged as key enabling technologies for cyber-defense.
In this paper, we are concerned with the investigation of the various deep learning techniques employed for network intrusion detection.
arXiv Detail & Related papers (2020-12-04T23:09:35Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.