A short review on Applications of Deep learning for Cyber security

Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works related to deep learning based solutions for various cyber security use cases. Keywords: Deep learning, intrusion detection, malware detection, Android malware detection, spam & phishing detection, traffic analysis, binary analysis.

[1]  K. P. Soman,et al.  Distributed representation using target classes: Bag of tricks for security and privacy analytics Amrita-NLP@IWSPA-2018 , 2018 .

[2]  K. P. Soman,et al.  Evaluating deep learning approaches to characterize and classify the DGAs at scale , 2018, J. Intell. Fuzzy Syst..

[3]  Yusuke Doi,et al.  Classification of URL bitstreams using bag of bytes , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).

[4]  K. P. Soman,et al.  Detecting Android malware using Long Short-term Memory (LSTM) , 2018, J. Intell. Fuzzy Syst..

[5]  Razvan Pascanu,et al.  Malware classification with recurrent networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Prabaharan Poornachandran,et al.  Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis , 2018 .

[7]  Ralf C. Staudemeyer,et al.  Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data , 2013, SAICSIT '13.

[8]  K. P. Soman,et al.  A machine learning approach towards phishing email detection CEN-Security@IWSPA 2018 , 2018 .

[9]  Arun Kumar Sangaiah,et al.  Android malware detection based on system call sequences and LSTM , 2019, Multimedia Tools and Applications.

[10]  Jian Zhang,et al.  Classification of Android apps and malware using deep neural networks , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[11]  Zhenlong Yuan,et al.  DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .

[12]  Prabaharan Poornachandran,et al.  ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis , 2019, J. Cyber Secur. Mobil..

[13]  K. P. Soman,et al.  Deep android malware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[14]  Pierre Lison,et al.  Automatic Detection of Malware-Generated Domains with Recurrent Neural Models , 2017, ArXiv.

[15]  K. P. Soman,et al.  Detecting malicious domain names using deep learning approaches at scale , 2018, J. Intell. Fuzzy Syst..

[16]  R. Vinayakumar,et al.  DeepMalNet: Evaluating shallow and deep networks for static PE malware detection , 2018, ICT Express.

[17]  K. P. Soman,et al.  DeepImageSpam: Deep Learning based Image Spam Detection , 2018, ArXiv.

[18]  Elmar Gerhards-Padilla,et al.  Automatic Extraction of Domain Name Generation Algorithms from Current Malware , 2012 .

[19]  K. P. Soman,et al.  Evaluating shallow and deep networks for ransomware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[20]  Mahmood Yousefi-Azar,et al.  Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[21]  Martine De Cock,et al.  Inline DGA Detection with Deep Networks , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[22]  K. P. Soman,et al.  Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[23]  K. P. Soman,et al.  Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[24]  Rakesh M. Verma Security Analytics: Adapting Data Science for Security Challenges , 2018, IWSPA@CODASPY.

[25]  Jack W. Stokes,et al.  Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[26]  Jack W. Stokes,et al.  Malware classification with LSTM and GRU language models and a character-level CNN , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[28]  K. P. Soman,et al.  Deep Learning for Network Flow Analysis and Malware Classification , 2017, SSCC.

[29]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[30]  K. P. Soman,et al.  Applying deep learning approaches for network traffic prediction , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[31]  Prabaharan Poornachandran,et al.  Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).

[32]  Konstantin Berlin,et al.  Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[33]  Martine De Cock,et al.  Character Level based Detection of DGA Domain Names , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[34]  K. P. Soman,et al.  Evaluating effectiveness of shallow and deep networks to intrusion detection system , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[35]  Eric Schulte,et al.  Using recurrent neural networks for decompilation , 2018, 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER).

[36]  K. P. Soman,et al.  Evaluating shallow and deep networks for secure shell (ssh)traffic analysis , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[37]  R Vinayakumar,et al.  Comparative Study of the Detection of Malicious URLs Using Shallow and Deep Networks , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[38]  Hyrum S. Anderson,et al.  Predicting Domain Generation Algorithms with Long Short-Term Memory Networks , 2016, ArXiv.

[39]  Luis F. T. Moraes,et al.  Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets , 2018 .

[40]  Zhenkai Liang,et al.  Neural Nets Can Learn Function Type Signatures From Binaries , 2017, USENIX Security Symposium.

[41]  K. P. Soman,et al.  DeepAnti-PhishNet: Applying deep neural networks for phishing email detection CEN-AISecurity@IWSPA-2018 , 2018 .

[42]  Cheng-Chew Lim,et al.  Looking deeper: Using deep learning to identify internet communications traffic , 2017 .

[43]  Zeng Feng,et al.  Classification for DGA-Based Malicious Domain Names with Deep Learning Architectures , 2017 .

[44]  K. P. Soman,et al.  Evaluating deep learning approaches to characterize and classify malicious URL's , 2018, J. Intell. Fuzzy Syst..

[45]  Prabaharan Poornachandran,et al.  Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[46]  Wenyi Huang,et al.  MtNet: A Multi-Task Neural Network for Dynamic Malware Classification , 2016, DIMVA.

[47]  P SomanK.,et al.  A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities , 2018, ArXiv.

[48]  Dawn Xiaodong Song,et al.  Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.

[49]  K. P. Soman,et al.  Long short-term memory based operation log anomaly detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[50]  Yunheung Paek,et al.  LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems , 2016, ArXiv.