Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Publication type: Journal Article
Publication date: 2021-02-01
scimago Q1
wos Q1
SJR: 3.276
CiteScore: 38.4
Impact factor: 12.7
ISSN: 15740137, 18767745
Theoretical Computer Science
General Computer Science
Abstract
Cybersecurity mainly prevents the hardware, software, and data present in the system that has an active internet connection from external attacks. Organizations mainly deploy cybersecurity for their databases and systems to prevent it from unauthorized access. Different forms of attacks like phishing, spear-phishing, a drive-by attack, a password attack, denial of service, etc. are responsible for these security problems In this survey, we analyzed and reviewed the usage of deep learning algorithms for Cybersecurity applications. Deep learning which is also known as Deep Neural Networks includes machine learning techniques that enable the network to learn from unsupervised data and solve complex problems. Here, 80 papers from 2014 to 2019 have been used and successfully analyzed. Deep learning approaches such as Convolutional Neural Network (CNN), Auto Encoder (AE), Deep Belief Network (DBN), Recurrent Neural Network (RNN), Generative Adversal Network (GAN) and Deep Reinforcement Learning (DIL) are used to categorize the papers referred. Each specific technique is effectively discussed with its algorithms, platforms, dataset, and potential benefits. The paper related to deep learning with cybersecurity is mainly published in the year 2018 in a large number and 18% of published articles originate from the UK. In addition, the papers are selected from a variety of journals, and 30% of papers used are from the Elsevier journal. From the experimental analysis, it is clear that the deep learning model improved the accuracy, scalability, reliability, and performance of the cybersecurity applications when applied in realtime.
Found
Nothing found, try to update filter.
Found
Nothing found, try to update filter.
Top-30
Journals
|
1
2
3
4
5
6
7
|
|
|
IEEE Access
7 publications, 4.24%
|
|
|
Sensors
5 publications, 3.03%
|
|
|
Lecture Notes in Networks and Systems
4 publications, 2.42%
|
|
|
Electronics (Switzerland)
4 publications, 2.42%
|
|
|
Engineering Applications of Artificial Intelligence
3 publications, 1.82%
|
|
|
Machine Learning with Applications
3 publications, 1.82%
|
|
|
International Journal of Information Security
2 publications, 1.21%
|
|
|
Computer Systems Science and Engineering
2 publications, 1.21%
|
|
|
Computer Science Review
2 publications, 1.21%
|
|
|
Neurocomputing
2 publications, 1.21%
|
|
|
Communications in Computer and Information Science
2 publications, 1.21%
|
|
|
Cryptology and Network Security with Machine Learning
2 publications, 1.21%
|
|
|
Security and Communication Networks
2 publications, 1.21%
|
|
|
Computers and Electrical Engineering
2 publications, 1.21%
|
|
|
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
2 publications, 1.21%
|
|
|
PeerJ Computer Science
2 publications, 1.21%
|
|
|
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
2 publications, 1.21%
|
|
|
Algorithms
2 publications, 1.21%
|
|
|
Computers and Security
2 publications, 1.21%
|
|
|
Scientific Reports
2 publications, 1.21%
|
|
|
Discover Applied Sciences
2 publications, 1.21%
|
|
|
International Journal of Distributed Systems and Technologies
1 publication, 0.61%
|
|
|
International Journal of Information Security and Privacy
1 publication, 0.61%
|
|
|
Cryptography
1 publication, 0.61%
|
|
|
Frontiers in Energy Research
1 publication, 0.61%
|
|
|
Computers, Materials and Continua
1 publication, 0.61%
|
|
|
Energies
1 publication, 0.61%
|
|
|
Neural Computing and Applications
1 publication, 0.61%
|
|
|
Artificial Intelligence Review
1 publication, 0.61%
|
|
|
1
2
3
4
5
6
7
|
Publishers
|
5
10
15
20
25
30
35
40
45
|
|
|
Institute of Electrical and Electronics Engineers (IEEE)
41 publications, 24.85%
|
|
|
Elsevier
36 publications, 21.82%
|
|
|
Springer Nature
32 publications, 19.39%
|
|
|
MDPI
17 publications, 10.3%
|
|
|
IGI Global
6 publications, 3.64%
|
|
|
Wiley
5 publications, 3.03%
|
|
|
Taylor & Francis
4 publications, 2.42%
|
|
|
Tech Science Press
3 publications, 1.82%
|
|
|
Hindawi Limited
3 publications, 1.82%
|
|
|
PeerJ
2 publications, 1.21%
|
|
|
Association for Computing Machinery (ACM)
2 publications, 1.21%
|
|
|
Frontiers Media S.A.
1 publication, 0.61%
|
|
|
Oxford University Press
1 publication, 0.61%
|
|
|
Universitas Pendidikan Indonesia
1 publication, 0.61%
|
|
|
American Institute of Mathematical Sciences (AIMS)
1 publication, 0.61%
|
|
|
SAGE
1 publication, 0.61%
|
|
|
Institution of Engineering and Technology (IET)
1 publication, 0.61%
|
|
|
American Chemical Society (ACS)
1 publication, 0.61%
|
|
|
Ediciones Universidad de Salamanca
1 publication, 0.61%
|
|
|
Bentham Science Publishers Ltd.
1 publication, 0.61%
|
|
|
AIP Publishing
1 publication, 0.61%
|
|
|
World Scientific
1 publication, 0.61%
|
|
|
5
10
15
20
25
30
35
40
45
|
- We do not take into account publications without a DOI.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
167
Total citations:
167
Citations from 2024:
87
(52.72%)
Cite this
GOST |
RIS |
BibTex
Cite this
GOST
Copy
Dixit P., Silakari S. Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review // Computer Science Review. 2021. Vol. 39. p. 100317.
GOST all authors (up to 50)
Copy
Dixit P., Silakari S. Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review // Computer Science Review. 2021. Vol. 39. p. 100317.
Cite this
RIS
Copy
TY - JOUR
DO - 10.1016/j.cosrev.2020.100317
UR - https://doi.org/10.1016/j.cosrev.2020.100317
TI - Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
T2 - Computer Science Review
AU - Dixit, Priyanka
AU - Silakari, Sanjay
PY - 2021
DA - 2021/02/01
PB - Elsevier
SP - 100317
VL - 39
SN - 1574-0137
SN - 1876-7745
ER -
Cite this
BibTex (up to 50 authors)
Copy
@article{2021_Dixit,
author = {Priyanka Dixit and Sanjay Silakari},
title = {Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review},
journal = {Computer Science Review},
year = {2021},
volume = {39},
publisher = {Elsevier},
month = {feb},
url = {https://doi.org/10.1016/j.cosrev.2020.100317},
pages = {100317},
doi = {10.1016/j.cosrev.2020.100317}
}