62
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Survey of Deep Learning Methods for Cyber Security

      , , ,
      Information
      MDPI AG

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural networks, generative adversarial networks, and several others. Then we discuss how each of the DL methods is used for security applications. We cover a broad array of attack types including malware, spam, insider threats, network intrusions, false data injection, and malicious domain names used by botnets.

          Related collections

          Most cited references33

          • Record: found
          • Abstract: not found
          • Article: not found

          Deep Learning: Methods and Applications

          Li Deng (2013)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              DDoS in the IoT: Mirai and Other Botnets

                Bookmark

                Author and article information

                Journal
                INFOGG
                Information
                Information
                MDPI AG
                2078-2489
                April 2019
                April 02 2019
                : 10
                : 4
                : 122
                Article
                10.3390/info10040122
                801c5e98-6aef-4f95-959f-7ef03aebb4c4
                © 2019

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article