4.7 Article

A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks

Journal

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Volume 23, Issue 3, Pages 1920-1955

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2021.3086296

Keywords

Computer security; Malware; Security; Privacy; Computer crime; Software; Computer architecture; Cyberattacks; deep learning; machine learning; mobile networking; privacy; security; wireless networking

Funding

  1. Generalitat de Catalunya [2017SGR962]
  2. DRAC Project [001-P-001723]

Ask authors/readers for more resources

The widespread use of mobile devices and mobile services has posed serious cybersecurity challenges, leading to the adoption of Deep Learning models for more efficient detection of attacks. This paper provides a comprehensive survey of recent cybersecurity works using DL in mobile and wireless networks, covering various aspects of cybersecurity and identifying effective DL methods for different threats and attacks.
The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available