skip to main content
survey

A Survey on Representation Learning Efforts in Cybersecurity Domain

Published: 16 October 2019 Publication History

Abstract

In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Traditional cybersecurity approaches are based on old threat-knowledge databases and need to be updated on a daily basis to stand against new generation of cyber-threats and protect underlying network-based systems. Along with updating threat-knowledge databases, there is a need for proper management and processing of data generated by sensitive real-time applications. In recent years, various computing platforms based on representation learning algorithms have emerged as a useful resource to manage and exploit the generated data to extract meaningful information. If these platforms are properly utilized, then strong cybersecurity systems can be developed to protect the underlying network-based systems and support sensitive real-time applications. In this survey, we highlight various cyber-threats, real-life examples, and initiatives taken by various international organizations. We discuss various computing platforms based on representation learning algorithms to process and analyze the generated data. We highlight various popular datasets introduced by well-known global organizations that can be used to train the representation learning algorithms to predict and detect threats. We also provide an in-depth analysis of research efforts based on representation learning algorithms made in recent years to protect the underlying network-based systems against current cyber-threats. Finally, we highlight various limitations and challenges in these efforts and available datasets that need to be considered when using them to build cybersecurity systems.

References

[1]
2018. Network Forensics and Network Security Monitoring (Netresec). Retrieved from http://www.netresec.com/?page=AboutNetresec.
[2]
Abebe Abeshu and Naveen Chilamkurti. 2018. Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 56, 2 (2018), 169--175.
[3]
United States Military Academy. 2018. Cyber Research Center. Retrieved from https://www.usma.edu/crc/SitePages/Home.aspx.
[4]
Ahmed AlEroud and Izzat Alsmadi. 2017. Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach. J. Netw. Comput. Appl. 80 (2017), 152--164.
[5]
Riham AlTawy and Amr M. Youssef. 2016. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices. IEEE Access 4 (2016), 959--979.
[6]
Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, and Kwangjo Kim. 2018. Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans. Inf. Forens. Secur. 13, 3 (2018), 621--636.
[7]
Haiyong Bao, Rongxing Lu, Beibei Li, and Ruilong Deng. 2016. BLITHE: Behavior rule-based insider threat detection for smart grid. IEEE Iof T J. 3, 2 (2016), 190--205.
[8]
Cristóbal Barba-González, José García-Nieto, María del Mar Roldán-García, Ismael Navas-Delgado, Antonio J. Nebro, and José F. Aldana-Montes. 2019. BIGOWL: Knowledge centered big data analytics. Expert Syst. Appl. 115 (2019), 543--556.
[9]
Roger Barga, Valentine Fontama, Wee Hyong Tok, and Luis Cabrera-Cordon. 2015. Predictive Analytics with Microsoft Azure Machine Learning. Springer.
[10]
Miguel Barreiros and Peter Lundqvist. 2015. QoS-Enabled Networks: Tools and Foundations. John Wiley 8 Sons.
[11]
Elias Bou-Harb, Mourad Debbabi, and Chadi Assi. 2013. A systematic approach for detecting and clustering distributed cyber scanning. Comput. Netw. 57, 18 (2013), 3826--3839.
[12]
S. Terry Brugger and Jedidiah Chow. 2007. An assessment of the DARPA IDS evaluation dataset using Snort. UCDAVIS Department of Computer Science 1, 2007 (2007), 22.
[13]
Anna L. Buczak and Erhan Guven. 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18, 2 (2016), 1153--1176.
[14]
Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos. 2012. Modeling security in cyber--physical systems. Int. J. Crit. Infrastr. Protect. 5, 3--4 (2012), 118--126.
[15]
Xingjuan Cai, Yun Niu, Shaojin Geng, Jiangjian Zhang, Zhihua Cui, Jianwei Li, and Jinjun Chen. 2019. An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search. Concurrency and Computation: Practice and Experience (2019).
[16]
Xingjuan Cai, Penghong Wang, Lei Du, Zhihua Cui, Wensheng Zhang, and Jinjun Chen. 2019. Multi-objective 3-dimensional DV-hop localization algorithm with NSGA-II. IEEE Sens. J. (2019).
[17]
Francesco Camastra, Angelo Ciaramella, and Antonino Staiano. 2013. Machine learning and soft computing for ICT security: An overview of current trends. J. Amb. Intell. Human. Comput. 4, 2 (2013), 235--247.
[18]
Patrick P. K. Chan, Zhe Lin, Xian Hu, Eric C. C. Tsang, and Daniel S. Yeung. 2017. Sensitivity based robust learning for stacked autoencoder against evasion attack. Neurocomputing 267 (2017), 572--580.
[19]
Brijesh Kashyap Chejerla and Sanjay K. Madria. 2017. QoS guaranteeing robust scheduling in attack resilient cloud integrated cyber physical system. Fut. Gener. Comput. Syst. 75 (2017), 145--157.
[20]
Ping Chen, Lieven Desmet, and Christophe Huygens. 2014. A study on advanced persistent threats. In Proceedings of the IFIP International Conference on Communications and Multimedia Security. Springer, 63--72.
[21]
Sujit Rokka Chhetri, Arquimedes Canedo, and Mohammad Abdullah Al Faruque. 2016. Kcad: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. ACM, 74.
[22]
Chris Clifton and Tamir Tassa. 2013. On syntactic anonymity and differential privacy. In Proceedings of the IEEE 29th International Conference on Data Engineering Workshops (ICDEW’13). IEEE, 88--93.
[23]
Gideon Creech. 2014. Developing a High-accuracy Cross Platform Host-Based Intrusion Detection System Capable of Reliably Detecting Zero-day Attacks. Ph.D. Dissertation. University of New South Wales, Canberra, Australia.
[24]
Gideon Creech and Jiankun Hu. 2013. Generation of a new IDS test dataset: Time to retire the KDD collection. In Proceedings of the Wireless Communications and Networking Conference (WCNC), 2013 IEEE. IEEE, 4487--4492.
[25]
Zhihua Cui, Yang Cao, Xingjuan Cai, Jianghui Cai, and Jinjun Chen. 2019. Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things. J. Parallel and Distrib. Comput. 132 (2019), 217--229.
[26]
Zhihua Cui, Bin Sun, Gaige Wang, Yu Xue, and Jinjun Chen. 2017. A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber--physical systems. J. Parallel and Distrib. Comput. 103 (2017), 42--52.
[27]
Zhihua Cui, Fei Xue, Xingjuan Cai, Yang Cao, Gai-ge Wang, and Jinjun Chen. 2018. Detection of malicious code variants based on deep learning. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3187--3196.
[28]
Zhihua Cui, Jiangjiang Zhang, Yechuang Wang, Yang Cao, Xingjuan Cai, Wensheng Zhang, and Jinjun Chen. 2019. A pigeon-inspired optimization algorithm for many-objective optimization problems. Sci. China Inf. Sci 62 (2019), 070212.
[29]
Kristopher Daley, Ryan Larson, and Jerald Dawkins. 2002. A structural framework for modeling multi-stage network attacks. In Proceedings of the International Conference on Parallel Processing Workshops, 2002. IEEE, 5--10.
[30]
Luca Deri et al. 2004. Improving passive packet capture: Beyond device polling. In Proceedings of the SANE, Vol. 2004. Amsterdam, Netherlands, 85--93.
[31]
Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, and Xian-Ming Zhang. 2018. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275 (2018), 1674--1683.
[32]
Abebe Abeshu Diro and Naveen Chilamkurti. 2017. Distributed attack detection scheme using deep learning approach for Internet of Things. Fut. Gener. Comput. Syst. 82 (2017), 761--768.
[33]
Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast internet-wide scanning and its security applications. In Proceedings of the USENIX Security Symposium, Vol. 8. 47--53.
[34]
Mohammad Esmalifalak, Lanchao Liu, Nam Nguyen, Rong Zheng, and Zhu Han. 2014. Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11, 3 (2014), 1644--1652.
[35]
Cristian Estan, Ken Keys, David Moore, and George Varghese. 2004. Building a better NetFlow. In Proceedings of the ACM SIGCOMM Computer Communication Review, Vol. 34. ACM, 245--256.
[36]
Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, and Helge Janicke. 2017. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101 (2017), 55--82.
[37]
Prahlad Fogla, Monirul I. Sharif, Roberto Perdisci, Oleg M. Kolesnikov, and Wenke Lee. 2006. Polymorphic blending attacks. In Proceedings of the USENIX Security Symposium. 241--256.
[38]
Homa Foroughi, Nilanjan Ray, and Hong Zhang. 2018. Object classification with joint projection and low-rank dictionary learning. IEEE Trans. Image Process. 27, 2 (2018), 806--821.
[39]
Felix Fuentes and Dulal C. Kar. 2005. Ethereal vs. Tcpdump: A comparative study on packet sniffing tools for educational purpose. J. Comput. Sci. Coll. 20, 4 (2005), 169--176.
[40]
Robin Gandhi, Anup Sharma, William Mahoney, William Sousan, Qiuming Zhu, and Phillip Laplante. 2011. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technol. Soc. Mag. 30, 1 (2011), 28--38.
[41]
Gigaom. 2013. This Is Interesting: A Fraud-Detection Company Built on Google’s Prediction API. Retrieved from https://gigaom.com/2013/07/31/this-is-interesting-a-fraud-detection-company-built-on-googles-prediction-api/.
[42]
Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos, and Murat Kantarcioglu. 2017. Security and privacy in cyber-physical systems: A survey of surveys. IEEE Des. Test 34, 4 (2017), 7--17.
[43]
Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. Sybilbelief: A semi-supervised learning approach for structure-based sybil detection. IEEE Trans. Inf. Forens. Secur. 9, 6 (2014), 976--987.
[44]
Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’13). IEEE, 6645--6649.
[45]
Tim Greene. 2015. Biggest data breaches of 2015. Network 10 (2015), 14.
[46]
B. B. Gupta and Tafseer Akhtar. 2017. A survey on smart power grid: Frameworks, tools, security issues, and solutions. Ann. Telecommun. 72, 9--10 (2017), 517--549.
[47]
Didem Gürdür and Fredrik Asplund. 2017. A systematic review to merge discourses: Interoperability, integration and cyber-physical systems. J. Industr. Inf. Integr. 9 (2017), 14--23.
[48]
Fariba Haddadi, Duc Le Cong, Laura Porter, and A. Nur Zincir-Heywood. 2015. On the effectiveness of different botnet detection approaches. In Information Security Practice and Experience. Springer, 121--135.
[49]
Adam Hahn, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 4, 2 (2013), 847--855.
[50]
Tarfa Hamed, Jason B. Ernst, and Stefan C. Kremer. 2018. A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. In Computer and Network Security Essentials. Springer, 113--134.
[51]
Simon Hansman and Ray Hunt. 2005. A taxonomy of network and computer attacks. Comput. Secur. 24, 1 (2005), 31--43.
[52]
Muneeb Ul Hassan, Mubashir Husain Rehmani, Ramamohanarao Kotagiri, Jiekui Zhang, and Jinjun Chen. 2019. Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 131 (2019), 69--80.
[53]
Haibo He and Jun Yan. 2016. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Phys. Syst.: Theory Appl. 1, 1 (2016), 13--27.
[54]
Ryan Heartfield and George Loukas. 2016. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. 48, 3 (2016), 37.
[55]
Ryan Heartfield, George Loukas, and Diane Gan. 2016. You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access 4 (2016), 6910--6928.
[56]
Geoffrey E. Hinton. 2012. A practical guide to training restricted Boltzmann machines. In Neural Networks: Tricks of the Trade. Springer, 599--619.
[57]
Geoffrey E. Hinton and Terrence Joseph Sejnowski. 1999. Unsupervised Learning: Foundations of Neural Computation. MIT Press.
[58]
Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling, et al. 2008. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. Large-Scale Exploits and Emergent Threats (LEET) 8, 1 (2008), 1--9.
[59]
Fei Hu, Yu Lu, Athanasios V. Vasilakos, Qi Hao, Rui Ma, Yogendra Patil, Ting Zhang, Jiang Lu, Xin Li, and Neal N. Xiong. 2016. Robust cyber--physical systems: Concept, models, and implementation. Fut. Gener. Comput. Syst. 56 (2016), 449--475.
[60]
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo, and Jeffrey Voas. 2015. Attribute-based access control. Computer 48, 2 (2015), 85--88.
[61]
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security: A survey. IEEE IoT J. 4, 6 (2017), 1802--1831.
[62]
Rahat Iqbal, Faiyaz Doctor, Brian More, Shahid Mahmud, and Usman Yousuf. 2017. Big data analytics and computational intelligence for cyber--physical systems: Recent trends and state of the art applications. Fut. Gener. Comput. Syst. (2017).
[63]
Stuart Jacobs. 2011. Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance. Vol. 14. John Wiley 8 Sons.
[64]
Mian Ahmad Jan, Muhammad Usman, Xiangjian He, and Ateeq Ur Rehman. 2018. SAMS: A seamless and authorized multimedia streaming framework for WMSN-based IoMT. IEEE IoT J. 6, 2 (2018), 1576--15783.
[65]
Ian Jolliffe. 2011. Principal component analysis. In International Encyclopedia of Statistical Science. Springer, 1094--1096.
[66]
Klaus Julisch. 2013. Understanding and overcoming cyber security anti-patterns. Comput. Netw. 57, 10 (2013), 2206--2211.
[67]
Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu. 2002. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 7 (2002), 881--892.
[68]
Da-Yu Kao and Shou-Ching Hsiao. 2018. The dynamic analysis of WannaCry ransomware. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT’18). IEEE, 159--166.
[69]
Stamatis Karnouskos. 2011. Stuxnet worm impact on industrial cyber-physical system security. In Proceedings of the 37th Annual Conference on IEEE Industrial Electronics Society (IECON’11). IEEE, 4490--4494.
[70]
Ziv Katzir and Yuval Elovici. 2018. Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92 (2018), 419--429.
[71]
Ratinder Kaur and Maninder Singh. 2014. A survey on zero-day polymorphic worm detection techniques. IEEE Commun. Surv. Tutor. 16, 3 (2014), 1520--1549.
[72]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems. 1097--1105.
[73]
Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, and Kuinam J. Kim. 2017. A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 1 (2017), 1--13.
[74]
Nicolas Le Roux and Yoshua Bengio. 2008. Representational power of restricted Boltzmann machines and deep belief networks. Neur. Comput. 20, 6 (2008), 1631--1649.
[75]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436--444.
[76]
Jay Lee, Chao Jin, and Behrad Bagheri. 2017. Cyber physical systems for predictive production systems. Prod. Eng. 11, 2 (2017), 155--165.
[77]
Jialing Li, Lingjia Liu, Chenyuan Zhao, Kian Hamedani, Rachad Atat, and Yang Yi. 2017. Enabling sustainable cyber physical security systems through neuromorphic computing. IEEE Trans. Sust. Comput. 3, 2 (2017), 112--125.
[78]
Senyu Li, Fangming Bi, Wei Chen, Xuzhi Miao, Jin Liu, and Chaogang Tang. 2018. An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6 (2018), 10311--10319.
[79]
Yinghua Li, He Yu, Bin Song, and Jinjun Chen. 2019. Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurr. Comput.: Pract. Exper. (2019).
[80]
Kevin Liao, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn. 2016. Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin. In Proceedings of the APWG Symposium on Electronic Crime Research (eCrime’16). IEEE, 1--13.
[81]
WIRED Magazine. 2011. FORD, Google team up to make smarter cars. Retrieved from https://www.wired.com/2011/05/ford-google-prediction-api/.
[82]
Gary Miliefsky. 2008. Proactive network security system to protect against hackers. U.S. Patent 7,346,922.
[83]
Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2012. Foundations of Machine Learning. MIT Press.
[84]
Nour Moustafa, Jill Slay, and Gideon Creech. 2017. Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans. Big Data (2017).
[85]
Maryam M. Najafabadi, Flavio Villanustre, Taghi M. Khoshgoftaar, Naeem Seliya, Randall Wald, and Edin Muharemagic. 2015. Deep learning applications and challenges in big data analytics. J. Big Data 2, 1 (2015), 1.
[86]
E. Allison Newcomb, Robert J. Hammell, and Steve Hutchinson. 2016. Effective prioritization of network intrusion alerts to enhance situational awareness. In Proceedings of the IEEE Conference on Intelligence and Security Informatics (ISI’16). IEEE, 73--78.
[87]
Hironori Nishikaze, Seiichi Ozawa, Jun Kitazono, Tao Ban, Junji Nakazato, and Jumpei Shimamura. 2015. Large-scale monitoring for cyber attacks by using cluster information on darknet traffic features. Proc. Comput. Sci. 53 (2015), 175--182.
[88]
Stavros Ntalampiras. 2015. Detection of integrity attacks in cyber-physical critical infrastructures using ensemble modeling. IEEE Trans. Industr. Inf. 11, 1 (2015), 104--111.
[89]
Stavros Ntalampiras. 2016. Automatic identification of integrity attacks in cyber-physical systems. Expert Syst. Appl. 58 (2016), 164--173.
[90]
Angela Orebaugh, Gilbert Ramirez, and Jay Beale. 2006. Wireshark 8 Ethereal Network Protocol Analyzer Toolkit. Elsevier.
[91]
Hamed Orojloo and Mohammad Abdollahi Azgomi. 2017. A method for evaluating the consequence propagation of security attacks in cyber--physical systems. Fut. Gener. Comput. Syst. 67 (2017), 57--71.
[92]
Ramkumar Paranthaman and Bhavani Thuraisingham. 2017. Malware collection and analysis. In Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI’17). IEEE, 26--31.
[93]
Sebastien Pouliot. 2010. System and method for using sandboxes in a managed shell. U.S. Patent 7,725,922.
[94]
Abhilasha Singh Rathor, Amit Agarwal, and Preeti Dimri. 2018. Comparative study of machine learning approaches for Amazon reviews. Proc. Comput. Sci. 132 (2018), 1552--1561.
[95]
Aunshul Rege, Zoran Obradovic, Nima Asadi, and Edward Parker. 2018. Predicting adversarial cyber intrusion stages using autoregressive neural networks. IEEE Intell. Syst. 33, 2 (2018), 29--39.
[96]
Zahoor-Ur Rehman, Sidra Nasim Khan, Khan Muhammad, Jong Weon Lee, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Awan, and Irfan Mehmood. 2017. Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. Computers 8 Electrical Engineering 132 (2017).
[97]
Rami Rosen. 2014. Internet control message protocol (ICMP). In Linux Kernel Networking. Springer, 37--61.
[98]
Jitendra Kumar Rout, Anmol Dalmia, Kim-Kwang Raymond Choo, Sambit Bakshi, and Sanjay Kumar Jena. 2017. Revisiting semi-supervised learning for online deceptive review detection. IEEE Access 5, 1 (2017), 1319--1327.
[99]
Robin Ruefle, Audrey Dorofee, David Mundie, Allen D. Householder, Michael Murray, and Samuel J. Perl. 2014. Computer security incident response team development and evolution. IEEE Secur. Priv. 12, 5 (2014), 16--26.
[100]
Jukka Ruohonen, Sami Hyrynsalmi, and Ville Leppänen. 2016. An outlook on the institutional evolution of the European Union cyber security apparatus. Gov. Inf. Quart. 33, 4 (2016), 746--756.
[101]
Nasser R. Sabar, Xun Yi, and Andy Song. 2018. A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access 6 (2018), 10421--10431.
[102]
Hamidreza Sadreazami, Arash Mohammadi, Amir Asif, and Konstantinos N. Plataniotis. 2017. Distributed graph-based statistical approach for intrusion detection in cyber-physical systems. IEEE Trans. Sign. Inf. Process. Netw. 4, 1 (2017), 137--147.
[103]
Alan Saied, Richard E. Overill, and Tomasz Radzik. 2016. Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172 (2016), 385--393.
[104]
Benjamin Sangster, T. J. O’Connor, Thomas Cook, Robert Fanelli, Erik Dean, Christopher Morrell, and Gregory J. Conti. 2009. Toward instrumenting network warfare competitions to generate labeled datasets. In Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET’09).
[105]
Andrea Saracino, Daniele Sgandurra, Gianluca Dini, and Fabio Martinelli. 2016. Madam: Effective and efficient behavior-based android malware detection and prevention. IEEE Trans. Depend. Sec. Comput. 15, 1 (2016), 83--97.
[106]
Nolen Scaife, Henry Carter, Patrick Traynor, and Kevin R. B. Butler. 2016. Cryptolock (and drop it): Stopping ransomware attacks on user data. In Proceedings of the IEEE 36th International Conference on Distributed Computing Systems (ICDCS’16). IEEE, 303--312.
[107]
Robert J. Schalkoff. 1997. Artificial Neural Networks. Vol. 1. McGraw--Hill, New York.
[108]
Mischa Schmidt and Christer Åhlund. 2018. Smart buildings as cyber-physical systems: Data-driven predictive control strategies for energy efficiency. Renew. Sust. Energy Rev. 90 (2018), 742--756.
[109]
Su Sheng, W. L. Chan, K. K. Li, Duan Xianzhong, and Zeng Xiangjun. 2007. Context information-based cyber security defense of protection system. IEEE Trans. Power Deliv. 22, 3 (2007), 1477--1481.
[110]
Peter W. Singer and Allan Friedman. 2014. Cybersecurity: What Everyone Needs to Know. Oxford University Press, Oxford, UK.
[111]
Sidney C. Smith, Robert J. Hammell, Kin W. Wong, and Carlos J. Mateo. 2016. An experimental exploration of the impact of host-level packet loss on network intrusion detection. In Proceedings of the Cybersecurity Symposium (CYBERSEC’16). IEEE, 13--19.
[112]
Houbing Song, Glenn A. Fink, and Sabina Jeschke. 2017. Security and Privacy in Cyber-physical Systems: Foundations, Principles, and Applications. John Wiley 8 Sons.
[113]
Aditya K. Sood and Richard J. Enbody. 2013. Targeted cyberattacks: A superset of advanced persistent threats. IEEE Secur. Priv. 11, 1 (2013), 54--61.
[114]
Lance Spitzner. 2003. Honeypots: Tracking Hackers. Vol. 1. Addison-Wesley, Reading, MA.
[115]
V. Srihari and R. Anitha. 2014. DDoS detection system using wavelet features and semi-supervised learning. In Proceedings of the International Symposium on Security in Computing and Communication. Springer, 291--303.
[116]
Nasrin Sultana, Naveen Chilamkurti, Wei Peng, and Rabei Alhadad. 2018. Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications 12, 2 (2018), 1--9.
[117]
Paweł Szynkiewicz and Adam Kozakiewicz. 2017. Design and evaluation of a system for network threat signatures generation. J. Comput. Sci. 22 (2017), 187--197.
[118]
Wei Tan, Yushun Fan, Ahmed Ghoneim, M. Anwar Hossain, and Schahram Dustdar. 2016. From the service-oriented architecture to the web API economy. IEEE Internet Comput. 20, 4 (2016), 64--68.
[119]
Adrian Taylor, Sylvain Leblanc, and Nathalie Japkowicz. 2018. Probing the limits of anomaly detectors for automobiles with a cyber attack framework. IEEE Intell. Syst. 33, 2 (2018), 54--62.
[120]
Ciza Thomas, Vishwas Sharma, and N. Balakrishnan. 2008. Usefulness of DARPA dataset for intrusion detection system evaluation. In Proceedings of the Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Vol. 6973. International Society for Optics and Photonics, 69730G.
[121]
Olivier Thonnard, Leyla Bilge, Gavin O’Gorman, Seán Kiernan, and Martin Lee. 2012. Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. Springer, 64--85.
[122]
Gina C. Tjhai, Maria Papadaki, Steven M. Furnell, and Nathan L. Clarke. 2008. The problem of false alarms: Evaluation with snort and DARPA 1999 dataset. In Proceedings of the International Conference on Trust, Privacy and Security in Digital Business. Springer, 139--150.
[123]
Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction APIs. In Proceedings of the USENIX Security Symposium. 601--618.
[124]
Muhammad Usman, Xiangjian He, Kenneth K. M. Lam, Min Xu, Jinjun Chen, Syed Mohsin Matloob Bokhari, and Mian Ahmad Jan. 2017. Error concealment for cloud-based and scalable video coding of HD videos. IEEE Trans. Cloud Comput. (2017).
[125]
Muhammad Usman, Xiangjian He, Kin-Man Lam, Min Xu, Syed Mohsin Matloob Bokhari, and Jinjun Chen. 2016. Frame interpolation for cloud-based mobile video streaming. IEEE Trans. Multimedia 18, 5 (2016), 831--839.
[126]
Muhammad Usman, Mian Ahmad Jan, and Xiangjian He. 2017. Cryptography-based secure data storage and sharing using HEVC and public clouds. Inf. Sci. 387 (2017), 90--102.
[127]
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Muhammad Alam. 2018. Performance evaluation of high definition video streaming over mobile ad hoc networks. Sign. Process. 148 (2018), 303--313.
[128]
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Jinjun Chen. 2018. A mobile multimedia data collection scheme for secured wireless multimedia sensor networks. IEEE Trans. Netw. Sci. Eng. (2018).
[129]
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Jinjun Chen. 2019. P2DCA: A privacy-preserving based data collection and analysis framework for IoMT applications. IEEE J. Select. Areas Commun. 37, 6 (2019), 1222--1230.
[130]
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Priyadarsi Nanda. 2016. Data sharing in secure multimedia wireless sensor networks. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA Conference. IEEE, 590--597.
[131]
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Priyadarsi Nanda. 2018. QASEC: A secured data communication scheme for mobile ad-hoc networks. Fut. Gener. Comput. Syst. (2018).
[132]
Muhammad Usman, Ning Yang, Mian Ahmad Jan, Xiangjian He, Min Xu, and Kin-Man Lam. 2018. A joint framework for QoS and QoE for video transmission over wireless multimedia sensor networks. IEEE Trans. Mobile Comput. 17, 4 (2018), 746--759.
[133]
Jorge Valenzuela, Jianhui Wang, and Nancy Bissinger. 2013. Real-time intrusion detection in power system operations. IEEE Trans. Power Syst. 28, 2 (2013), 1052--1062.
[134]
Pascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Bengio, and Pierre-Antoine Manzagol. 2010. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 11, (Dec. 2010), 3371--3408.
[135]
Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger. 2015. Network and device forensic analysis of android social-messaging applications. Digital Investigation 14 (2015), S77--S84.
[136]
Gai-Ge Wang, Xingjuan Cai, Zhihua Cui, Geyong Min, and Jinjun Chen. 2017. High performance computing for cyber physical social systems by using evolutionary multi-objective optimization algorithm. IEEE Trans. Emerg. Top. Comput. (2017).
[137]
Penghong Wang, Jianrou Huang, Zhihua Cui, Liping Xie, and Jinjun Chen. 2019. A Gaussian error correction multi-objective positioning model with NSGA-II. Concurr. Comput.: Pract. Exper. (2019).
[138]
Marilyn Wolf and Dimitrios Serpanos. 2018. Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106, 1 (2018), 9--20.
[139]
Guangyu Wu, Jian Sun, and Jie Chen. 2016. A survey on the security of cyber-physical systems. Contr. Theory Technol. 14, 1 (2016), 2--10.
[140]
Longfei Wu, Xiaojiang Du, and Jie Wu. 2016. Effective defense schemes for phishing attacks on mobile computing platforms. IEEE Trans. Vehic. Technol. 65, 8 (2016), 6678--6691.
[141]
Mingtao Wu, Zhengyi Song, and Young B. Moon. 2017. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manufact. 30, 3 (2017), 1111--1123.
[142]
Miao Xie and Jiankun Hu. 2013. Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld. In Proceedings of the 6th International Congress on Image and Signal Processing (CISP’13), Vol. 3. IEEE, 1711--1716.
[143]
Miao Xie, Jiankun Hu, and Jill Slay. 2014. Evaluating host-based anomaly detection systems: Application of the one-class svm algorithm to adfa-ld. In Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’14). IEEE, 978--982.
[144]
Liqun Yang, Yuancheng Li, and Zhoujun Li. 2017. Improved-ELM method for detecting false data attack in smart grid. Int. J. Electr. Power Energy Syst. 91 (2017), 183--191.
[145]
Yasser Yasami and Saadat Pour Mozaffari. 2010. A novel unsupervised classification approach for network anomaly detection by k-means clustering and ID3 decision tree learning methods. J. Supercomput. 53, 1 (2010), 231--245.
[146]
Yanfang Ye, Lingwei Chen, Shifu Hou, William Hardy, and Xin Li. 2017. DeepAM: A heterogeneous deep learning framework for intelligent malware detection. Knowl. Inf. Syst. 54, 2 (2017), 265--285.
[147]
Maoqing Zhang, Hui Wang, Zhihua Cui, and Jinjun Chen. 2018. Hybrid multi-objective cuckoo search with dynamical local search. Memetic Comput. 10, 2 (2018), 199--208.
[148]
Xiaoke Zhu, Xiao-Yuan Jing, Liang Yang, Xinge You, Dan Chen, Guangwei Gao, and Yunhong Wang. 2017. Semi-supervised cross-view projection-based dictionary learning for video-based person re-identification. IEEE Trans. Circ. Syst. Vid. Technol. 28, 10 (2017), 2599--2611.

Cited By

View all
  • (2025)Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge reviewInternational Journal of Information Security10.1007/s10207-024-00935-824:1Online publication date: 1-Feb-2025
  • (2024)A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future DirectionsACM Computing Surveys10.1145/368903657:3(1-38)Online publication date: 11-Nov-2024
  • (2024)Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power SystemsIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2023.325722535:5(6145-6155)Online publication date: May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 52, Issue 6
November 2020
806 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3368196
  • Editor:
  • Sartaj Sahni
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 October 2019
Accepted: 01 February 2019
Revised: 01 December 2018
Received: 01 June 2018
Published in CSUR Volume 52, Issue 6

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cyber-attacks
  2. computing
  3. cybersecurity
  4. datasets
  5. representation learning

Qualifiers

  • Survey
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)115
  • Downloads (Last 6 weeks)6
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge reviewInternational Journal of Information Security10.1007/s10207-024-00935-824:1Online publication date: 1-Feb-2025
  • (2024)A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future DirectionsACM Computing Surveys10.1145/368903657:3(1-38)Online publication date: 11-Nov-2024
  • (2024)Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power SystemsIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2023.325722535:5(6145-6155)Online publication date: May-2024
  • (2024)ICT Security through Games2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI)10.1109/SAMI60510.2024.10432807(000447-000454)Online publication date: 25-Jan-2024
  • (2024)AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10533010(1-8)Online publication date: 26-Feb-2024
  • (2024)Survey on Explainable AI: Techniques, challenges and open issuesExpert Systems with Applications10.1016/j.eswa.2024.124710255(124710)Online publication date: Dec-2024
  • (2023)The Analysis of Cyber security in Intelligent Transportation Systems Using Multi-Objective Optimization on the Basis of Ratio Analysis (MOORA) MethodComputer Science, Engineering and Technology10.46632/cset/1/3/11:3(1-7)Online publication date: 3-Sep-2023
  • (2023)Ataki na urządzenia mobilne i metody ich wykrywaniaCybersecurity and Law10.35467/cal/1693039:1(95-107)Online publication date: 20-Feb-2023
  • (2023)A Survey on Threat Hunting in Enterprise NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.329951925:4(2299-2324)Online publication date: Dec-2024
  • (2023)Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing EnvironmentMobile Networks and Applications10.1007/s11036-023-02176-w28:6(2191-2203)Online publication date: 1-Dec-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media