Loading…
A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks
The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect comple...
Saved in:
Published in: | IEEE Communications surveys and tutorials 2021-01, Vol.23 (3), p.1920-1955 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3 |
---|---|
cites | cdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3 |
container_end_page | 1955 |
container_issue | 3 |
container_start_page | 1920 |
container_title | IEEE Communications surveys and tutorials |
container_volume | 23 |
creator | Rodriguez, Eva Otero, Beatriz Gutierrez, Norma Canal, Ramon |
description | The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks. |
doi_str_mv | 10.1109/COMST.2021.3086296 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9447833</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9447833</ieee_id><sourcerecordid>2562957402</sourcerecordid><originalsourceid>FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</originalsourceid><addsrcrecordid>eNpNkM1OwzAQhC0EEqXwAnCxxDnFf7HjYxUoVGrpoUXiZiVmDS4lKXYCytuT0gpx2j3M7M58CF1SMqKU6Jt8MV-uRowwOuIkk0zLIzSgacqTTKnn43_7KTqLcU2IYEKTAZqO8bINX9Dh2uFbgC2eQREqX73iFdi3yn-2ELGrA867EkIE2wbfdNhXeF6XfgP4EZrvOrzHc3Tiik2Ei8McoqfJ3Sp_SGaL-2k-niWWc90kzomCSWGldanTArjlTgjGMqmUKJmmnEMKADajssz4i9aEUCGVtYWlXFs-RNf7u9tQ78I1Zl23oepfGpb2zVMlCOtVbK-yoY4xgDPb4D-K0BlKzA6Z-UVmdsjMAVlvutqbfB_gz6CFUBnn_AeLymdi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2562957402</pqid></control><display><type>article</type><title>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Rodriguez, Eva ; Otero, Beatriz ; Gutierrez, Norma ; Canal, Ramon</creator><creatorcontrib>Rodriguez, Eva ; Otero, Beatriz ; Gutierrez, Norma ; Canal, Ramon</creatorcontrib><description>The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.</description><identifier>ISSN: 1553-877X</identifier><identifier>EISSN: 1553-877X</identifier><identifier>EISSN: 2373-745X</identifier><identifier>DOI: 10.1109/COMST.2021.3086296</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Complexity ; Computer architecture ; Computer crime ; Computer security ; Cyberattacks ; Cybersecurity ; Deep learning ; Electronic devices ; machine learning ; Malware ; mobile networking ; Privacy ; Security ; Software ; wireless networking ; Wireless networks</subject><ispartof>IEEE Communications surveys and tutorials, 2021-01, Vol.23 (3), p.1920-1955</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</citedby><cites>FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</cites><orcidid>0000-0003-4542-204X ; 0000-0001-5904-7039</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9447833$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Rodriguez, Eva</creatorcontrib><creatorcontrib>Otero, Beatriz</creatorcontrib><creatorcontrib>Gutierrez, Norma</creatorcontrib><creatorcontrib>Canal, Ramon</creatorcontrib><title>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</title><title>IEEE Communications surveys and tutorials</title><addtitle>COMST</addtitle><description>The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.</description><subject>Complexity</subject><subject>Computer architecture</subject><subject>Computer crime</subject><subject>Computer security</subject><subject>Cyberattacks</subject><subject>Cybersecurity</subject><subject>Deep learning</subject><subject>Electronic devices</subject><subject>machine learning</subject><subject>Malware</subject><subject>mobile networking</subject><subject>Privacy</subject><subject>Security</subject><subject>Software</subject><subject>wireless networking</subject><subject>Wireless networks</subject><issn>1553-877X</issn><issn>1553-877X</issn><issn>2373-745X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNpNkM1OwzAQhC0EEqXwAnCxxDnFf7HjYxUoVGrpoUXiZiVmDS4lKXYCytuT0gpx2j3M7M58CF1SMqKU6Jt8MV-uRowwOuIkk0zLIzSgacqTTKnn43_7KTqLcU2IYEKTAZqO8bINX9Dh2uFbgC2eQREqX73iFdi3yn-2ELGrA867EkIE2wbfdNhXeF6XfgP4EZrvOrzHc3Tiik2Ei8McoqfJ3Sp_SGaL-2k-niWWc90kzomCSWGldanTArjlTgjGMqmUKJmmnEMKADajssz4i9aEUCGVtYWlXFs-RNf7u9tQ78I1Zl23oepfGpb2zVMlCOtVbK-yoY4xgDPb4D-K0BlKzA6Z-UVmdsjMAVlvutqbfB_gz6CFUBnn_AeLymdi</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Rodriguez, Eva</creator><creator>Otero, Beatriz</creator><creator>Gutierrez, Norma</creator><creator>Canal, Ramon</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4542-204X</orcidid><orcidid>https://orcid.org/0000-0001-5904-7039</orcidid></search><sort><creationdate>20210101</creationdate><title>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</title><author>Rodriguez, Eva ; Otero, Beatriz ; Gutierrez, Norma ; Canal, Ramon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Complexity</topic><topic>Computer architecture</topic><topic>Computer crime</topic><topic>Computer security</topic><topic>Cyberattacks</topic><topic>Cybersecurity</topic><topic>Deep learning</topic><topic>Electronic devices</topic><topic>machine learning</topic><topic>Malware</topic><topic>mobile networking</topic><topic>Privacy</topic><topic>Security</topic><topic>Software</topic><topic>wireless networking</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rodriguez, Eva</creatorcontrib><creatorcontrib>Otero, Beatriz</creatorcontrib><creatorcontrib>Gutierrez, Norma</creatorcontrib><creatorcontrib>Canal, Ramon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE Communications surveys and tutorials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rodriguez, Eva</au><au>Otero, Beatriz</au><au>Gutierrez, Norma</au><au>Canal, Ramon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks</atitle><jtitle>IEEE Communications surveys and tutorials</jtitle><stitle>COMST</stitle><date>2021-01-01</date><risdate>2021</risdate><volume>23</volume><issue>3</issue><spage>1920</spage><epage>1955</epage><pages>1920-1955</pages><issn>1553-877X</issn><eissn>1553-877X</eissn><eissn>2373-745X</eissn><abstract>The widespread use of mobile devices, as well as the increasing popularity of mobile services has raised serious cybersecurity challenges. In the last years, the number of cyberattacks has grown dramatically, as well as their complexity. Traditional cybersecurity systems have failed to detect complex attacks, unknown malware, and they do not guarantee the preservation of user privacy. Consequently, cybersecurity systems have embraced Deep Learning (DL) models as they provide efficient detection of novel attacks and better accuracy. This paper presents a comprehensive survey of recent cybersecurity works that use DL in mobile and wireless networks. It covers all cybersecurity aspects: infrastructure threads and attacks, software attacks and privacy preservation. First, we provide a detailed overview of DL techniques applied, or with potential applications, to cybersecurity. Then, we review cybersecurity works based on DL. For each cybersecurity threat or attack, we discuss the challenges for using DL methods. For each contribution, we review the implementation details and the performance of the solution. In a nutshell, this paper constitutes the first survey that provides a complete review of the DL methods for cybersecurity. Given the analysis performed, we identify the most effective DL methods for the different threats and attacks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/COMST.2021.3086296</doi><tpages>36</tpages><orcidid>https://orcid.org/0000-0003-4542-204X</orcidid><orcidid>https://orcid.org/0000-0001-5904-7039</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1553-877X |
ispartof | IEEE Communications surveys and tutorials, 2021-01, Vol.23 (3), p.1920-1955 |
issn | 1553-877X 1553-877X 2373-745X |
language | eng |
recordid | cdi_ieee_primary_9447833 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Complexity Computer architecture Computer crime Computer security Cyberattacks Cybersecurity Deep learning Electronic devices machine learning Malware mobile networking Privacy Security Software wireless networking Wireless networks |
title | A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T21%3A41%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Deep%20Learning%20Techniques%20for%20Cybersecurity%20in%20Mobile%20Networks&rft.jtitle=IEEE%20Communications%20surveys%20and%20tutorials&rft.au=Rodriguez,%20Eva&rft.date=2021-01-01&rft.volume=23&rft.issue=3&rft.spage=1920&rft.epage=1955&rft.pages=1920-1955&rft.issn=1553-877X&rft.eissn=1553-877X&rft_id=info:doi/10.1109/COMST.2021.3086296&rft_dat=%3Cproquest_ieee_%3E2562957402%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c339t-ff4a264c6cf5f94e3c3f442286774b29133e5eeec816b83d99001467ccac139c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2562957402&rft_id=info:pmid/&rft_ieee_id=9447833&rfr_iscdi=true |