Loading…

A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks

The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect comple...

Full description

Saved in:
Bibliographic Details
Published in:IEEE Communications surveys and tutorials 2021-01, Vol.23 (3), p.1920-1955
Main Authors: Rodriguez, Eva, Otero, Beatriz, Gutierrez, Norma, Canal, Ramon
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3
cites cdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3
container_end_page 1955
container_issue 3
container_start_page 1920
container_title IEEE Communications surveys and tutorials
container_volume 23
creator Rodriguez, Eva
Otero, Beatriz
Gutierrez, Norma
Canal, Ramon
description The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.
doi_str_mv 10.1109/COMST.2021.3086296
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9447833</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9447833</ieee_id><sourcerecordid>2562957402</sourcerecordid><originalsourceid>FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</originalsourceid><addsrcrecordid>eNpNkM1OwzAQhC0EEqXwAnCxxDnFf7HjYxUoVGrpoUXiZiVmDS4lKXYCytuT0gpx2j3M7M58CF1SMqKU6Jt8MV-uRowwOuIkk0zLIzSgacqTTKnn43_7KTqLcU2IYEKTAZqO8bINX9Dh2uFbgC2eQREqX73iFdi3yn-2ELGrA867EkIE2wbfdNhXeF6XfgP4EZrvOrzHc3Tiik2Ei8McoqfJ3Sp_SGaL-2k-niWWc90kzomCSWGldanTArjlTgjGMqmUKJmmnEMKADajssz4i9aEUCGVtYWlXFs-RNf7u9tQ78I1Zl23oepfGpb2zVMlCOtVbK-yoY4xgDPb4D-K0BlKzA6Z-UVmdsjMAVlvutqbfB_gz6CFUBnn_AeLymdi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2562957402</pqid></control><display><type>article</type><title>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Rodriguez, Eva ; Otero, Beatriz ; Gutierrez, Norma ; Canal, Ramon</creator><creatorcontrib>Rodriguez, Eva ; Otero, Beatriz ; Gutierrez, Norma ; Canal, Ramon</creatorcontrib><description>The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.</description><identifier>ISSN: 1553-877X</identifier><identifier>EISSN: 1553-877X</identifier><identifier>EISSN: 2373-745X</identifier><identifier>DOI: 10.1109/COMST.2021.3086296</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Complexity ; Computer architecture ; Computer crime ; Computer security ; Cyberattacks ; Cybersecurity ; Deep learning ; Electronic devices ; machine learning ; Malware ; mobile networking ; Privacy ; Security ; Software ; wireless networking ; Wireless networks</subject><ispartof>IEEE Communications surveys and tutorials, 2021-01, Vol.23 (3), p.1920-1955</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</citedby><cites>FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</cites><orcidid>0000-0003-4542-204X ; 0000-0001-5904-7039</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9447833$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Rodriguez, Eva</creatorcontrib><creatorcontrib>Otero, Beatriz</creatorcontrib><creatorcontrib>Gutierrez, Norma</creatorcontrib><creatorcontrib>Canal, Ramon</creatorcontrib><title>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</title><title>IEEE Communications surveys and tutorials</title><addtitle>COMST</addtitle><description>The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.</description><subject>Complexity</subject><subject>Computer architecture</subject><subject>Computer crime</subject><subject>Computer security</subject><subject>Cyberattacks</subject><subject>Cybersecurity</subject><subject>Deep learning</subject><subject>Electronic devices</subject><subject>machine learning</subject><subject>Malware</subject><subject>mobile networking</subject><subject>Privacy</subject><subject>Security</subject><subject>Software</subject><subject>wireless networking</subject><subject>Wireless networks</subject><issn>1553-877X</issn><issn>1553-877X</issn><issn>2373-745X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNpNkM1OwzAQhC0EEqXwAnCxxDnFf7HjYxUoVGrpoUXiZiVmDS4lKXYCytuT0gpx2j3M7M58CF1SMqKU6Jt8MV-uRowwOuIkk0zLIzSgacqTTKnn43_7KTqLcU2IYEKTAZqO8bINX9Dh2uFbgC2eQREqX73iFdi3yn-2ELGrA867EkIE2wbfdNhXeF6XfgP4EZrvOrzHc3Tiik2Ei8McoqfJ3Sp_SGaL-2k-niWWc90kzomCSWGldanTArjlTgjGMqmUKJmmnEMKADajssz4i9aEUCGVtYWlXFs-RNf7u9tQ78I1Zl23oepfGpb2zVMlCOtVbK-yoY4xgDPb4D-K0BlKzA6Z-UVmdsjMAVlvutqbfB_gz6CFUBnn_AeLymdi</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Rodriguez, Eva</creator><creator>Otero, Beatriz</creator><creator>Gutierrez, Norma</creator><creator>Canal, Ramon</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4542-204X</orcidid><orcidid>https://orcid.org/0000-0001-5904-7039</orcidid></search><sort><creationdate>20210101</creationdate><title>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</title><author>Rodriguez, Eva ; Otero, Beatriz ; Gutierrez, Norma ; Canal, Ramon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Complexity</topic><topic>Computer architecture</topic><topic>Computer crime</topic><topic>Computer security</topic><topic>Cyberattacks</topic><topic>Cybersecurity</topic><topic>Deep learning</topic><topic>Electronic devices</topic><topic>machine learning</topic><topic>Malware</topic><topic>mobile networking</topic><topic>Privacy</topic><topic>Security</topic><topic>Software</topic><topic>wireless networking</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rodriguez, Eva</creatorcontrib><creatorcontrib>Otero, Beatriz</creatorcontrib><creatorcontrib>Gutierrez, Norma</creatorcontrib><creatorcontrib>Canal, Ramon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE Communications surveys and tutorials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rodriguez, Eva</au><au>Otero, Beatriz</au><au>Gutierrez, Norma</au><au>Canal, Ramon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</atitle><jtitle>IEEE Communications surveys and tutorials</jtitle><stitle>COMST</stitle><date>2021-01-01</date><risdate>2021</risdate><volume>23</volume><issue>3</issue><spage>1920</spage><epage>1955</epage><pages>1920-1955</pages><issn>1553-877X</issn><eissn>1553-877X</eissn><eissn>2373-745X</eissn><abstract>The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/COMST.2021.3086296</doi><tpages>36</tpages><orcidid>https://orcid.org/0000-0003-4542-204X</orcidid><orcidid>https://orcid.org/0000-0001-5904-7039</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1553-877X
ispartof IEEE Communications surveys and tutorials, 2021-01, Vol.23 (3), p.1920-1955
issn 1553-877X
1553-877X
2373-745X
language eng
recordid cdi_ieee_primary_9447833
source IEEE Electronic Library (IEL) Journals
subjects Complexity
Computer architecture
Computer crime
Computer security
Cyberattacks
Cybersecurity
Deep learning
Electronic devices
machine learning
Malware
mobile networking
Privacy
Security
Software
wireless networking
Wireless networks
title A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T21%3A41%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Deep%20Learning%20Techniques%20for%20Cybersecurity%20in%20Mobile%20Networks&rft.jtitle=IEEE%20Communications%20surveys%20and%20tutorials&rft.au=Rodriguez,%20Eva&rft.date=2021-01-01&rft.volume=23&rft.issue=3&rft.spage=1920&rft.epage=1955&rft.pages=1920-1955&rft.issn=1553-877X&rft.eissn=1553-877X&rft_id=info:doi/10.1109/COMST.2021.3086296&rft_dat=%3Cproquest_ieee_%3E2562957402%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2562957402&rft_id=info:pmid/&rft_ieee_id=9447833&rfr_iscdi=true