Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review

Abstract Cybersecurity mainly prevents the hardware, software, and data present in the system that has an active internet connection from external attacks. Organizations mainly deploy cybersecurity for their databases and systems to prevent it from unauthorized access. Different forms of attacks like phishing, spear-phishing, a drive-by attack, a password attack, denial of service, etc. are responsible for these security problems In this survey, we analyzed and reviewed the usage of deep learning algorithms for Cybersecurity applications. Deep learning which is also known as Deep Neural Networks includes machine learning techniques that enable the network to learn from unsupervised data and solve complex problems. Here, 80 papers from 2014 to 2019 have been used and successfully analyzed. Deep learning approaches such as Convolutional Neural Network (CNN), Auto Encoder (AE), Deep Belief Network (DBN), Recurrent Neural Network (RNN), Generative Adversal Network (GAN) and Deep Reinforcement Learning (DIL) are used to categorize the papers referred. Each specific technique is effectively discussed with its algorithms, platforms, dataset, and potential benefits. The paper related to deep learning with cybersecurity is mainly published in the year 2018 in a large number and 18% of published articles originate from the UK. In addition, the papers are selected from a variety of journals, and 30% of papers used are from the Elsevier journal. From the experimental analysis, it is clear that the deep learning model improved the accuracy, scalability, reliability, and performance of the cybersecurity applications when applied in realtime.

[1]  Geethapriya Thamilarasu,et al.  Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.

[2]  Vinu Sundararaj,et al.  An Efficient Threshold Prediction Scheme for Wavelet Based ECG Signal Noise Reduction Using Variable Step Size Firefly Algorithm , 2016 .

[3]  Ali A. Ghorbani,et al.  Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.

[4]  Alan T. Sherman,et al.  Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes , 2018, IEEE Transactions on Education.

[5]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[6]  Mingyan Liu,et al.  Generating Adversarial Examples with Adversarial Networks , 2018, IJCAI.

[7]  Erik Cambria,et al.  Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..

[8]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[9]  Jaime Lloret,et al.  Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.

[10]  Edward K. Wong,et al.  JPEG Steganalysis Based on DenseNet , 2017, ArXiv.

[11]  Hee-su Chae,et al.  Feature Selection for Intrusion Detection using NSL-KDD , 2013 .

[12]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[13]  Xiangyang Luo,et al.  Anti-steganalysis for image on convolutional neural networks , 2018, Multimedia Tools and Applications.

[14]  Donghong Ji,et al.  Multi-task and multi-view training for end-to-end relation extraction , 2019, Neurocomputing.

[15]  Pascal Vincent,et al.  Generalized Denoising Auto-Encoders as Generative Models , 2013, NIPS.

[16]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[17]  Qin Zheng,et al.  IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture , 2020, Comput. Networks.

[18]  Verónica Bolón-Canedo,et al.  Performance evaluation of unsupervised techniques in cyber-attack anomaly detection , 2019, Journal of Ambient Intelligence and Humanized Computing.

[19]  Zheng Qin,et al.  A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding , 2019, Comput. Secur..

[20]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[21]  Mamoun Alazab,et al.  A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security , 2020 .

[22]  Shouhuai Xu,et al.  A deep learning framework for predicting cyber attacks rates , 2019, EURASIP J. Inf. Secur..

[23]  Jun Yang,et al.  Improved traffic detection with support vector machine based on restricted Boltzmann machine , 2017, Soft Comput..

[24]  Zongqing Lu,et al.  Learning Attentional Communication for Multi-Agent Cooperation , 2018, NeurIPS.

[25]  Xianbin Wang,et al.  Machine learning techniques for intrusion detection on public dataset , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[26]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[27]  Dong Yu,et al.  Recent progresses in deep learning based acoustic models , 2017, IEEE/CAA Journal of Automatica Sinica.

[28]  Chris Yakopcic,et al.  A State-of-the-Art Survey on Deep Learning Theory and Architectures , 2019, Electronics.

[29]  Vinu Sundararaj,et al.  Optimal Task Assignment in Mobile Cloud Computing by Queue Based Ant-Bee Algorithm , 2018, Wirel. Pers. Commun..

[30]  Shahrokh Valaee,et al.  Recent Advances in Recurrent Neural Networks , 2017, ArXiv.

[31]  K. P. Soman,et al.  Robust Intelligent Malware Detection Using Deep Learning , 2019, IEEE Access.

[32]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[33]  Lianbing Deng,et al.  A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..

[34]  Wei Xiong,et al.  Stacked Convolutional Denoising Auto-Encoders for Feature Representation , 2017, IEEE Transactions on Cybernetics.

[35]  Geoffrey E. Hinton,et al.  Acoustic Modeling Using Deep Belief Networks , 2012, IEEE Transactions on Audio, Speech, and Language Processing.

[36]  Mario Vega-Barbas,et al.  Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies , 2020, IEEE Access.

[37]  Elaine M. Raybourn,et al.  A Zero-Entry Cyber Range Environment for Future Learning Ecosystems , 2018, Cyber-Physical Systems Security.

[38]  Jian Sun,et al.  Optimal switching integrity attacks in cyber-physical systems , 2017, 2017 32nd Youth Academic Annual Conference of Chinese Association of Automation (YAC).

[39]  Vijay Janapa Reddi,et al.  Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[40]  Zhe Gan,et al.  Variational Autoencoder for Deep Learning of Images, Labels and Captions , 2016, NIPS.

[41]  Bin Zhou,et al.  Deep learning aided interval state prediction for improving cyber security in energy internet , 2019, Energy.

[42]  Vinu Sundararaj,et al.  An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks , 2018, Comput. Secur..

[43]  Kai Liu,et al.  Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.

[44]  Andrew W. Senior,et al.  Fast and accurate recurrent neural network acoustic models for speech recognition , 2015, INTERSPEECH.

[45]  Yuval Elovici,et al.  Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks , 2021, IEEE Transactions on Neural Networks and Learning Systems.

[46]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[47]  Mitsuaki Akiyama,et al.  Empowering Anti-malware Research in Japan by Sharing the MWS Datasets , 2015, J. Inf. Process..

[48]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[49]  Zachary Chase Lipton A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.

[50]  Jiayi Cao,et al.  Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle , 2018 .

[51]  Vinu Sundararaj,et al.  Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction , 2017 .

[52]  Ali Tajer,et al.  Secure Estimation Under Causative Attacks , 2020, IEEE Transactions on Information Theory.

[53]  Wei Feng,et al.  A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit , 2018, Int. J. Intell. Comput. Cybern..

[54]  Usama Ahmed,et al.  Modelling cyber security for software-defined networks those grow strong when exposed to threats , 2015, Journal of Reliable Intelligent Environments.

[55]  Dong Yu,et al.  Exploring convolutional neural network structures and optimization techniques for speech recognition , 2013, INTERSPEECH.

[56]  Nagaraj Balakrishnan,et al.  Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things , 2019, Internet Things.

[57]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[58]  Arun Kumar Sangaiah,et al.  A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.

[59]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[60]  Yunhao Liu,et al.  Big Data: A Survey , 2014, Mob. Networks Appl..

[61]  Zhi Xue,et al.  IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection , 2018, PAKDD.

[62]  Sen Liu,et al.  Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles , 2020, IEEE Transactions on Vehicular Technology.

[63]  Guifang Liu,et al.  A Stacked Autoencoder-Based Deep Neural Network for Achieving Gearbox Fault Diagnosis , 2018, Mathematical Problems in Engineering.

[64]  Kenli Li,et al.  MalFCS: An effective malware classification framework with automated feature extraction based on deep convolutional neural networks , 2020, J. Parallel Distributed Comput..

[65]  Yuxi Li,et al.  Deep Reinforcement Learning: An Overview , 2017, ArXiv.

[66]  Amos J. Storkey,et al.  School of Informatics, University of Edinburgh , 2022 .

[67]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[68]  Hongpo Zhang,et al.  An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset , 2020, Comput. Networks.

[69]  Saeed Mahloujifar,et al.  Learning under p-tampering poisoning attacks , 2019, Annals of Mathematics and Artificial Intelligence.

[70]  Theodore T. Allen,et al.  Reward-based Monte Carlo-Bayesian reinforcement learning for cyber preventive maintenance , 2018, Comput. Ind. Eng..

[71]  See-Kiong Ng,et al.  Anomaly Detection with Generative Adversarial Networks for Multivariate Time Series , 2018, ArXiv.

[72]  Erchin Serpedin,et al.  Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks , 2019, Deep Learning Applications for Cyber Security.

[73]  Florian Skopik,et al.  A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..

[74]  Vinu Sundararaj,et al.  CCGPA‐MPPT: Cauchy preferential crossover‐based global pollination algorithm for MPPT in photovoltaic system , 2020, Progress in Photovoltaics: Research and Applications.

[75]  Yuval Elovici,et al.  Quantifying the resilience of machine learning classifiers used for cyber security , 2018, Expert Syst. Appl..

[76]  Jiliang Tang,et al.  Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.

[77]  R. Vinayakumar,et al.  A hybrid deep learning image-based analysis for effective malware detection , 2019, J. Inf. Secur. Appl..

[78]  Ying Zhang,et al.  Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.

[79]  Jules White,et al.  Cyber-physical security challenges in manufacturing systems , 2014 .