4.7 Review

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

An intrusion detection approach using ensemble Support Vector Machine based Chaos Game Optimization algorithm in big data platform

A. Ponmalar et al.

Summary: This paper presents a novel technique to enhance intrusion detection by addressing the complexities of heterogeneous security data in big data. The proposed methodology significantly improves accuracy and can identify different types of attacks. Comparisons with baseline models demonstrate the effectiveness of the approach.

APPLIED SOFT COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Federated learning for malware detection in IoT devices

Valerian Rey et al.

Summary: With the increasing number of IoT devices and the growing importance of data privacy and security, researching the application and security issues of federated learning in IoT malware detection becomes crucial. This study explores the use of federated learning to detect malware while preserving data privacy and finds that it has the capability to detect malware, but further efforts are needed to enhance its robustness.

COMPUTER NETWORKS (2022)

Article Computer Science, Hardware & Architecture

Toward feasible machine learning model updates in network-based intrusion detection

Pedro Horchulhack et al.

Summary: Current intrusion detection schemes struggle to adapt to changing network behavior, requiring frequent and complex model updates. This paper proposes a new intrusion detection model that maintains accuracy through classification assessment and suppresses misclassifications caused by new network behavior.

COMPUTER NETWORKS (2022)

Article Computer Science, Hardware & Architecture

A collaborative approach to early detection of IoT Botnet

Giang L. Nguyen et al.

Summary: With the increasing threats and diversity in attack methods, there are major challenges in detecting security vulnerabilities and attacks in IoT systems. Existing works rely heavily on full-time series data, limiting their effectiveness. Therefore, this paper proposes a collaborative machine learning model based on multiple features to automate the early detection of IoT botnets. The proposed model achieves an accuracy of 99.37% on a dataset of 5023 IoT botnet and 3888 benign samples.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Theory & Methods

A lightweight supervised intrusion detection mechanism for IoT networks

Souradip Roy et al.

Summary: The increasing popularity of the Internet of Things has led to more security breaches associated with vulnerable IoT devices, emphasizing the importance of employing intrusion detection techniques. Traditional intrusion detection mechanisms may not work well for IoT environments, leading to the proposal of a novel intrusion detection model utilizing machine learning. Through optimizations such as removal of multicollinearity and dimensionality reduction, the model shows promising results with high detection rates and low false alarm rates in experiments on popular datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Telecommunications

Intrusion Detection System in Wireless Sensor Networks and Fair Resource Allocation Using Geometric Deep Learning Techniques

S. Narasimha Prasad et al.

Summary: The study aims to protect the resources of wireless sensor nodes from attackers by using Graph Neural Networks to process the flow time of specific traffic, and to detect traffic fairness in multi-hop communication.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

Muhammad Azmi Umer et al.

Summary: This survey focuses on the application of machine learning in secure Industrial Control Systems, specifically in intrusion and anomaly detection. By comparing and analyzing four types of machine learning methods, the challenges associated with using these methods are identified, and recommendations are made.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2022)

Article Computer Science, Artificial Intelligence

Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection

Muhammad Shabbir Abbasi et al.

Summary: Ransomware is a type of malware that encrypts data and demands ransom. Behavior-based ransomware detection is challenging due to a large number of system calls in the analysis output. This study presents an automated feature selection method using particle swarm optimization for behavior-based ransomware detection and classification.

APPLIED SOFT COMPUTING (2022)

Article Computer Science, Theory & Methods

AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis

Shishir Kumar Shandilya et al.

Summary: This work presents a standard testbed for measuring the efficacy and efficiency of customized networks under active attack scenarios, allowing users to design, implement, and evaluate active cyber defense mechanisms effectively. Results show significant improvement in defense mechanisms verified on the proposed testbed, with applicability discussed in modern technologies like Fog Computing and Edge Computing.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Hardware & Architecture

Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles

Jason Whelan et al.

Summary: Unmanned Aerial Vehicles (UAVs) are being used more frequently in critical operations, but they face increasing threats. Attacks against UAVs, such as spoofing and jamming, are becoming commonplace due to their simplicity and low cost. Securing UAVs is challenging due to vulnerabilities in underlying technologies. However, the development of an intelligent intrusion detection system (IDS) using principal component analysis (PCA) and one-class classifiers shows promise in detecting and mitigating these attacks.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Construction & Building Technology

ConvXSS: A deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure

Koundinya Kuppa et al.

Summary: In this paper, a novel deep learning approach named ConvXSS is proposed for the detection of XSS and code injection attacks. Context-based sanitization is then applied to remove the malicious code. Experimental results show that the proposed method achieves excellent performance in terms of detection speed and accuracy of CSS attacks.

SUSTAINABLE CITIES AND SOCIETY (2022)

Article Computer Science, Interdisciplinary Applications

Detection and prevention of man-in-the-middle attack in iot network using regression modeling

N. Sivasankari et al.

Summary: This paper discusses the security concerns in IoT applications and proposes a regression modeling technique to detect and mitigate man-in-the-middle attacks, ensuring secure data transmission.

ADVANCES IN ENGINEERING SOFTWARE (2022)

Article

Unveiling the potential of Graph Neural Networks for robust Intrusion Detection

David Pujol-Perich et al.

Performance Evaluation Review (2022)

Review Computer Science, Hardware & Architecture

A survey on machine learning-based malware detection in executable files

Jagsir Singh et al.

Summary: In the past decade, there has been a significant growth in the development of computer malware, leading to cybercriminals using malware as a weapon to attack computer systems. Machine learning algorithms are now being used for malware classification in order to develop effective malware detection systems, which face various challenges.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Computer Science, Information Systems

Cyber terrorism: A homogenized taxonomy and definition

Jordan J. Plotnek et al.

Summary: Large-scale cyber attacks are on the rise worldwide, often linked to the threat of cyber terrorism. This paper proposes a new, universally-applicable definition and taxonomy for cyber terrorism, derived from detailed analyses of existing definitions. This new approach aims to provide a common understanding for policy standardization, global collaboration, and research.

COMPUTERS & SECURITY (2021)

Article Computer Science, Theory & Methods

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

Syed Ibrahim Imtiaz et al.

Summary: As the use of Android smartphones becomes more widespread, there is an increasing need for more efficient methods to detect and prevent malicious applications from attacking and compromising user devices.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Hardware & Architecture

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

Hazim Hanif et al.

Summary: The detection of software vulnerabilities is crucial during the development phase to reduce security risks. While traditional detection methods are widely used, there is a lack of discussion on emerging machine learning techniques such as supervised learning and deep learning. Further research is needed to explore and address these gaps in vulnerability detection systems.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Arwa Aldweesh et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Nuclear Science & Technology

Cyber attack taxonomy for digital environment in nuclear power plants

Seungmin Kim et al.

NUCLEAR ENGINEERING AND TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic

Wisam Elmasry et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Cyber-security on smart grid: Threats and potential solutions

Muhammed Zekeriya Gunduz et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

A hybrid deep learning model for efficient intrusion detection in big data environment

Mohammad Mehedi Hassan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Artificial Intelligence

Detection of SQL injection based on artificial neural network

Peng Tang et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

An efficient XGBoost-DNN-based classification model for network intrusion detection system

Preethi Devan et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

An intrusion detection approach based on improved deep belief network

Qiuting Tian et al.

APPLIED INTELLIGENCE (2020)

Article Computer Science, Hardware & Architecture

A NSGA2-LR wrapper approach for feature selection in network intrusion detection

Chaouki Khammassi et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

A deep learning method with wrapper based feature extraction for wireless intrusion detection system

Sydney Mambwe Kasongo et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Artificial Intelligence

A comparative evaluation of unsupervised deep architectures for intrusion detection in sequential data streams

Dusan Sovilj et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Computer Science, Information Systems

IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks

Shuokang Huang et al.

AD HOC NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Building an efficient intrusion detection system based on feature selection and ensemble classifier

Yuyang Zhou et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

Building Auto-Encoder Intrusion Detection System based on random forest feature selection

XuKui Li et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis

Sandhya Mishra et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Theory & Methods

Genetic convolutional neural network for intrusion detection systems

Minh Tuan Nguyen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices

Jerry John Kponyo et al.

INTERNET OF THINGS (2020)

Article Information Science & Library Science

Why do users not report spear phishing emails?

Youngsun Kwak et al.

TELEMATICS AND INFORMATICS (2020)

Article Computer Science, Information Systems

Analysis of internet of things malware using image texture features and machine learning techniques

Mwangi Karanja Evanson et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization

Yanqing Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Comprehensive Survey on Geometric Deep Learning

Wenming Cao et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

An intelligent intrusion detection system

Nevrus Kaja et al.

APPLIED INTELLIGENCE (2019)

Article Computer Science, Hardware & Architecture

Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks

Celyn Birkinshaw et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Application of deep learning to cybersecurity: A survey

Samaneh Mandavifar et al.

NEUROCOMPUTING (2019)

Article Multidisciplinary Sciences

A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network

Muhammad Ashfaq Khan et al.

SYMMETRY-BASEL (2019)

Article Computer Science, Information Systems

Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms

Jiadong Ren et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

A survey of network-based intrusion detection data sets

Markus Ring et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Artificial Intelligence

Network anomaly detection using channel boosted and residual learning based deep convolutional neural network

Naveed Chouhan et al.

APPLIED SOFT COMPUTING (2019)

Article Computer Science, Theory & Methods

Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system

Aneta Poniszewska-Maranda et al.

COMPUTING (2019)

Review Computer Science, Artificial Intelligence

Review: machine learning techniques applied to cybersecurity

Javier Martinez Torres et al.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2019)

Article Computer Science, Information Systems

Building a Cloud IDS Using an Efficient Feature Selection Method and SVM

Wenjuan Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

SoftSwitch: a centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks

Muhammet Baykara et al.

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES (2019)

Review Computer Science, Information Systems

A Survey on malware analysis and mitigation techniques

S. Sibi Chakkaravarthy et al.

COMPUTER SCIENCE REVIEW (2019)

Article Computer Science, Information Systems

An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks

Yihan Xiao et al.

IEEE ACCESS (2019)

Review Computer Science, Information Systems

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

Rakesh Kumar et al.

COMPUTER SCIENCE REVIEW (2019)

Article Computer Science, Information Systems

A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System

Sydney Mambwe Kasongo et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers

Ahmed I. Saleh et al.

ARTIFICIAL INTELLIGENCE REVIEW (2019)

Review Computer Science, Artificial Intelligence

A survey of phishing attacks: Their types, vectors and technical approaches

Kang Leng Chiew et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Information Systems

Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data

Kai Peng et al.

IEEE ACCESS (2018)

Article Computer Science, Hardware & Architecture

An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection

Tamer Aldwairi et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection

Majjed Al-Qatf et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units

Congyuan Xu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Enhanced Network Anomaly Detection Based on Deep Neural Networks

Sheraz Naseer et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Network Intrusion Detection Method Based on PCA and Bayes Algorithm

Bing Zhang et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Artificial Intelligence

Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system

Wathiq Laftah Al-Yaseen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Taxonomy of Cross-Domain Attacks on CyberManufacturing System

Mingtao Wu et al.

COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS (2017)

Article Computer Science, Information Systems

A GA-LR wrapper approach for feature selection in network intrusion detection

Chaouki Khammassi et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Phishing environments, techniques, and countermeasures: A survey

Ahmed Aleroud et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns

Gideon Creech et al.

IEEE TRANSACTIONS ON COMPUTERS (2014)

Article Engineering, Electrical & Electronic

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Swarup Bhunia et al.

PROCEEDINGS OF THE IEEE (2014)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Multidisciplinary Sciences

Reducing the dimensionality of data with neural networks

G. E. Hinton et al.

SCIENCE (2006)

Article Computer Science, Artificial Intelligence

A fast learning algorithm for deep belief nets

Geoffrey E. Hinton et al.

NEURAL COMPUTATION (2006)