Using deep learning to solve computer security challenges: a survey
Abstract Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community. This paper seeks to provide a dedicated review of th...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2020-08-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-020-00055-5 |
_version_ | 1818112758238937088 |
---|---|
author | Yoon-Ho Choi Peng Liu Zitong Shang Haizhou Wang Zhilong Wang Lan Zhang Junwei Zhou Qingtian Zou |
author_facet | Yoon-Ho Choi Peng Liu Zitong Shang Haizhou Wang Zhilong Wang Lan Zhang Junwei Zhou Qingtian Zou |
author_sort | Yoon-Ho Choi |
collection | DOAJ |
description | Abstract Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community. This paper seeks to provide a dedicated review of the very recent research works on using Deep Learning techniques to solve computer security challenges. In particular, the review covers eight computer security problems being solved by applications of Deep Learning: security-oriented program analysis, defending return-oriented programming (ROP) attacks, achieving control-flow integrity (CFI), defending network attacks, malware classification, system-event-based anomaly detection, memory forensics, and fuzzing for software security. |
first_indexed | 2024-12-11T03:24:01Z |
format | Article |
id | doaj.art-80d906d200a54577a5f73e5162fe53c6 |
institution | Directory Open Access Journal |
issn | 2523-3246 |
language | English |
last_indexed | 2024-12-11T03:24:01Z |
publishDate | 2020-08-01 |
publisher | SpringerOpen |
record_format | Article |
series | Cybersecurity |
spelling | doaj.art-80d906d200a54577a5f73e5162fe53c62022-12-22T01:22:34ZengSpringerOpenCybersecurity2523-32462020-08-013113210.1186/s42400-020-00055-5Using deep learning to solve computer security challenges: a surveyYoon-Ho Choi0Peng Liu1Zitong Shang2Haizhou Wang3Zhilong Wang4Lan Zhang5Junwei Zhou6Qingtian Zou7The Pennsylvania State UniversityThe Pennsylvania State UniversityThe Pennsylvania State UniversityThe Pennsylvania State UniversityThe Pennsylvania State UniversityThe Pennsylvania State UniversityWuhan University of TechnologyThe Pennsylvania State UniversityAbstract Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community. This paper seeks to provide a dedicated review of the very recent research works on using Deep Learning techniques to solve computer security challenges. In particular, the review covers eight computer security problems being solved by applications of Deep Learning: security-oriented program analysis, defending return-oriented programming (ROP) attacks, achieving control-flow integrity (CFI), defending network attacks, malware classification, system-event-based anomaly detection, memory forensics, and fuzzing for software security.http://link.springer.com/article/10.1186/s42400-020-00055-5Deep learningSecurity-oriented program analysisReturn-oriented programming attacksControl-flow integrityNetwork attacksMalware classification |
spellingShingle | Yoon-Ho Choi Peng Liu Zitong Shang Haizhou Wang Zhilong Wang Lan Zhang Junwei Zhou Qingtian Zou Using deep learning to solve computer security challenges: a survey Cybersecurity Deep learning Security-oriented program analysis Return-oriented programming attacks Control-flow integrity Network attacks Malware classification |
title | Using deep learning to solve computer security challenges: a survey |
title_full | Using deep learning to solve computer security challenges: a survey |
title_fullStr | Using deep learning to solve computer security challenges: a survey |
title_full_unstemmed | Using deep learning to solve computer security challenges: a survey |
title_short | Using deep learning to solve computer security challenges: a survey |
title_sort | using deep learning to solve computer security challenges a survey |
topic | Deep learning Security-oriented program analysis Return-oriented programming attacks Control-flow integrity Network attacks Malware classification |
url | http://link.springer.com/article/10.1186/s42400-020-00055-5 |
work_keys_str_mv | AT yoonhochoi usingdeeplearningtosolvecomputersecuritychallengesasurvey AT pengliu usingdeeplearningtosolvecomputersecuritychallengesasurvey AT zitongshang usingdeeplearningtosolvecomputersecuritychallengesasurvey AT haizhouwang usingdeeplearningtosolvecomputersecuritychallengesasurvey AT zhilongwang usingdeeplearningtosolvecomputersecuritychallengesasurvey AT lanzhang usingdeeplearningtosolvecomputersecuritychallengesasurvey AT junweizhou usingdeeplearningtosolvecomputersecuritychallengesasurvey AT qingtianzou usingdeeplearningtosolvecomputersecuritychallengesasurvey |