| Literature DB >> 35271163 |
Chaitanya Gupta1, Ishita Johri2, Kathiravan Srinivasan1, Yuh-Chung Hu3, Saeed Mian Qaisar4, Kuo-Yi Huang5.
Abstract
Today's advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of information. Similarly, as mobile network topologies become more diverse and complicated, the incidence of security breaches has increased. It has hampered the uptake of smart mobile apps and services, which has been accentuated by the large variety of platforms that provide data, storage, computation, and application services to end-users. It becomes necessary in such scenarios to protect data and check its use and misuse. According to the research, an artificial intelligence-based security model should assure the secrecy, integrity, and authenticity of the system, its equipment, and the protocols that control the network, independent of its generation, in order to deal with such a complicated network. The open difficulties that mobile networks still face, such as unauthorised network scanning, fraud links, and so on, have been thoroughly examined. Numerous ML and DL techniques that can be utilised to create a secure environment, as well as various cyber security threats, are discussed. We address the necessity to develop new approaches to provide high security of electronic data in mobile networks because the possibilities for increasing mobile network security are inexhaustible.Entities:
Keywords: artificial intelligence; cyber security; cyber-attacks; deep learning; information security; machine learning; network; threats; vulnerabilities
Mesh:
Year: 2022 PMID: 35271163 PMCID: PMC8915055 DOI: 10.3390/s22052017
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1General taxonomy–artificial intelligence techniques.
Comparison with Previous Reviews. (✓: Discussed, ×: Not Discussed).
| Reference | Year | Number of Articles | Time Span | One-Sentence Summary | ML | DL |
|---|---|---|---|---|---|---|
| [ | 2017 | 260 | 1986–2017 | Intelligent network traffic control systems analysis and future study directions. | ✓ | ✓ |
| [ | 2019 | 145 | 2011–2019 | UAV communications for 5G networks and upcoming future networks. | × | × |
| [ | 2019 | 574 | 1986–2019 | Deep learning techniques in mobile and wireless networks. | ✓ | ✓ |
| [ | 2019 | 174 | 1958–2019 | Survey on DL methods for cyber security. | × | ✓ |
| [ | 2020 | 65 | 2004–2020 | An examination of AI-enabled phishing attack detection techniques. | ✓ | ✓ |
| [ | 2020 | 139 | 1990–2019 | Description of several ML approaches used in vehicular networks for communication, networking, and security. | ✓ | × |
| [ | 2020 | 262 | 2009–2020 | ML techniques used for cyber security. | ✓ | × |
| [ | 2020 | 668 | 1988–2020 | ML techniques description and comparison for cyber security. | ✓ | × |
| [ | 2020 | 88 | 1958–2020 | Report on neural networks usage for intrusion detection systems. | ✓ | ✓ |
| [ | 2020 | 142 | 1993–2020 | Network intrusion detection system. | ✓ | ✓ |
| [ | 2020 | 175 | 2002–2020 | Survey on moving networks. | × | × |
| [ | 2020 | 181 | 1991–2019 | Cyber security data science using machine learning. | ✓ | × |
| [ | 2021 | 189 | 1989–2021 | DL for challenged networks. | × | ✓ |
| [ | 2021 | 138 | 1999–2020 | ML approaches for mobile network and malicious behaviour detection. | ✓ | × |
| Our Review | 2022 | 177 | 1998–2022 | This review offers a widespread investigation on the various machine learning and deep learning models for electronic information security in mobile networks. | ✓ | ✓ |
Figure 2Articles selection process: Machine learning and deep learning models for electronic information security in mobile networks–PRISMA flow chart.
Figure 3Structural flow of this review.
Figure 4Nomenclature of current machine learning models for electronic information security.
A summary of works on machine learning techniques for electronic information security.
| Reference | Security-Category | Machine Learning Approaches Used | Key Contribution | Limitations |
|---|---|---|---|---|
| [ | Network Attack Patterns | C4.5 Decision Tree; Bayesian Network; Naive-Bayes; Decision Table |
Leveraging ML approach for defining security rules on the SDN controller. Viability of ML approach in SDN. Effects of minor security threats on SDN security. | The approach generates variable results for different datasets. A higher variance in data would lead to higher chances of false prediction. |
| [ | Network Anomaly Detection | GA; SVM |
Select more suitable packet fields through GA using the primary feature selection method. Using the enhanced SVM technique alongside one-class SVM novelty detection ability, enables a high soft margin SVM performance. | A more realistic profiling method would be required to apply the framework in a real TCP/IP traffic environment. |
| [ | Traffic Classification | Laplacian SVM |
Real-time and adaptive classification of a traffic flow into a QoS category without needing to identify the precise application that originates the traffic flow. | Labelling to be performed explicitly for the datasets in semi-supervised algorithms as unsupervised ML-based algorithms cannot be directly applied in SDN. |
| [ | Real-time Intrusion Detection | PSO; SVM |
To construct an IDS, an algorithm akin to the PSO-based selection approach is introduced. | Requires improvement in feature selection algorithm on search strategy and evaluation criterion. |
| [ | Jamming Attacks | ANN; SVM; LR; KNN; DT; NB |
Detection, localization, and avoiding power jamming attacks in optical networks using various ML based solutions. Lowering the probability of successful jamming of lightpaths using resource reallocation scheme that utilises the statistical information of attack detection accuracy. | The studied localization is limited to the jammed channel. |
| [ | Malware Detection | DT; NB; RF |
Providing a central solution for enterprise security which works on the firewall level in the network. Modern and enhanced machine learning and data mining are used to create a malware detection module. | The proposed solution is not viable for home users, being very processor heavy for a general-purpose machine. |
| [ | Network Anomalies (DoS Flooding) | AdaboostM1; RF; MLP |
ML related methods are used to detect and classify network intrusions utilising a MIB-based approach. To classify and detect the DoS and brute force attacks use various classifiers. Using ML algorithms for SNMP-MIB data is a very successful strategy for detecting DoS and brute force attacks. | None of the classifiers managed to detect the brute force attack in the TCP dataset.F-Measure results performance is less effective for AdaboostM1 classifiers in the TCP-SYN and UDP flood attacks compared to other attacks. |
| [ | Webshell Detection | K-means; MLP; NB; DT; SVM; KNN |
For IoT server security experimentation, a new dataset was compiled that included 1551 malicious PHP webshells and 2593 regular PHP scripts. For data pre-processing, term frequency inverse document frequency (TFIDF), opcode, and combined Opcode-TFIDF feature extraction approaches were explored. The dataset is analysed using feature clustering technique based on principal component analysis (PCA). Features important for webshell detection are evaluated. | Tests carried out on machine learning models for webshell detection on PHP scripts only. Higher accuracy results require IoT servers with reliable computing power. |
| [ | Jamming-Based Denial-of-Service and Eavesdropping Attacks | MLP; SVM; KNN; DT; Thresh |
Proposal of a unique approach to protect wireless communication in a WiNoC from external and internal attackers using persistent jamming-based denial-of-service (DoS) attacks and eavesdropping (ED). Securing communication over wireless channels with a lightweight and low-latency data scrambling mechanism. | In the presence of an internal DoS attack, the performance is not as adequate and only slightly better than a wired NoC. |
| [ | Poisoning Attacks (Unreliable Model Updates) | Stochastic Gradient Descent (SGD) Algorithm |
Resolving issues of unreliable model updates by introducing reputation as a reliable measure to choose trustworthy workers for reliable federated learning. An effective reputation computation technique is designed using a multi-weight subjective logic model. | Each local worker model trained needs to send regular updates to the central server at regular periods. Insufficient reliable method to monitor worker metrics. |
A summary of works on deep learning models for electronic information security.
| Reference | Security-Category | Deep Learning Models Used | Key Contribution | Limitations |
|---|---|---|---|---|
| [ | Malware Detection | Deep Convolutional Neural Network (DCNN) |
Hand-engineered malware features have no requirement. To make the process easier, the network is trained end-to-end to understand suitable properties and conduct classifications. After the model has been trained, it may be effectively and executed on a GPU with efficiency, permitting a large number of files to be scanned rapidly. |
For dynamic and static malware detection on several platforms, it is impractical. Malware detection is incompatible with the design and creation of data augmentation methods. |
| [ | Intrusion Detection System (IDS) | Artificial Neural Network (ANN), Stacked Auto Encoder (SAE) |
Select the most important features only to reduce their dimensionality. It is suitable for resource-constrained devices. The reduced input features are sufficient for classification tasks. |
Limited to lightweight IDS. The issue of a wireless network is difficult to solve. |
| [ | Network Traffic Identification | Stacked autoencoder and one-dimensional convolution neural network (CNN) |
Both of the tasks such as traffic characterization and application identification are dealt with. Automatic feature extraction saves time and money by eliminating the need for experts to detect and extract handmade elements from traffic, resulting in higher accuracy for traffic classification. |
Low efficiency for multi-channel (e.g., differentiating between various types of Skype traffic such as that of chats, video and voice calls) classification and accuracy in classifying Tor’s traffic, etc. |
| [ | Spam Email Detection | Bidirectional Encoder Representations from Transformers (BERT) |
Effectiveness of word embedding because of hyper-parameter fine-tuning. 98.67% and 98.66% F1 score indicating persistence and robustness of the model. |
Smaller input sequence taken. Not valid for text in other languages such as Arabic, etc. |
| [ | Intrusion Detection (5G) | RBM; RNN |
It can manage traffic fluctuation. Optimising the computational resources at any point in time along with refining the performance and behaviour of analysis and detection procedures is the primary goal. The architecture may adapt and adjust by itself the anomaly detection system depending on the amount of network flows gathered in real-time from 5G subscribers’ user equipment, reducing resource consumption and maximising efficiency. |
Because of the abundance of network traffic handled by a RAN, accuracy suffers. Model is not trained for a real-time environment. |
| [ | False Data Injection | RBM |
The detection scheme is unaffected by the number of attacked data, SVE detection thresholds, and certain degrees of noise in the surroundings. Model can achieve high accuracy for detection in presence of the operation faults occurring now and then. |
More realistic FDI attack behaviours are necessary in the model, along with an analysis of the smallest number of sensing units. |
| [ | Keystroke Verification | RNN |
A high scalability in terms of user count as well as good precision avoiding false positive errors |
Takes more time to be fully trained. The classification algorithm selection was affected under the assumption by authors that keystroke dynamics data was sequence-based. |
| [ | Border Gateway Protocol Anomaly Detection | RNN |
Solve the problem of bursts and noise in dynamic Internet traffic that occur regularly. It learns and grasps traffic patterns using historical features in a sliding time span. The classifier performs well. |
It’s vulnerable to overfitting, and using the dropout algorithm to prevent it is challenging. This method is affected by various random weight initialization. |
| [ | DGA | CNN RNN |
Amenable for real-time detection. |
There were 8 DGA that the model was not able to detect. |
| [ | Insider Threat | DFNN RNN CNN GNN |
DFNN: To detect anomalies one can employ the concept of utilising a deep autoencoder. RNN: Capturing temporal information of the users’ activity sequences. CNN: Great accuracy and precision if the data of a users’ activity can be represented in the form of images. GNN: Organisation information networks are fairly powerful to model the graph data. |
Data that is extremely unbalanced. In attacks, there is a lot of temporal information. Fusion of heterogeneous data. There aren’t any practical evaluation metrics. Interpretability. Subtle and Adaptive Threats. Fine-grained Detection. |
Figure 5Nomenclature of current deep learning models for electronic information security.
Figure 6Archetypal workflow of machine learning and deep learning models for electronic information security in mobile networks.
Figure 7Taxonomy of AI-enabled electronic information security models for mobile networks.
Figure 8Nomenclature of cyber-attacks used in this review.
Figure 9General taxonomy of cyber-threats.
List of various cyber-attack datasets.
| Reference | Year | Dataset Used | Dataset Size | Format | Details about the Dataset/Brief Description |
|---|---|---|---|---|---|
| [ | 2016 | CAIDA DDoS 2007 and MIT DARPA dataset | 5.3 GB | pcap (tcpdump) format |
An hour of anonymized traffic records from a DDoS attack on 4 August 2007 is included in this dataset. This form of denial-of-service attack tries to prevent users from accessing the server by using all of the computational resources and bandwidth on the network. |
| [ | 2015 | Botnet [Zeus (Snort), Zeus (NETRESEC), | 14 GB packets | packet |
It is a network-based dataset. It basically works on diverse networks and intercepts emulated traffic (Normal and attack traffic). The data set is well labelled but not balanced. |
| [ | 2009 | NSL-KDD | 4 GB of compressed (approx.)/150k points | tcpdump data |
The train set does not contain any redundant records nor any duplicate records. A limited number of datasets are taken into consideration for training and testing. |
| [ | 2011 | ISOT | 11 GB packets | packet |
The ISOT dataset was compiled from two different datasets comprising malicious traffic from the Honeynet project’s French chapter, which involved the Storm and Waledac botnets, respectively. |
| [ | 2016 | UNSW-NB-15 | 100 GB | CSV files |
The Australian Centre for Cyber Security’s (ACCS) Cyber Range Lab used an IXIA PerfectStorm programme to construct a combination of realistic modern regular activities and synthetic contemporary attack behaviours from network data. |
| [ | 2017 | Unified Host and | 150 GB flows | bi. flows, logs |
A subset of network and computer (host) events makes up the Unified Host and Network Dataset, events were collected over a 90-day period from the Los Alamos National Laboratory enterprise network. |
| [ | 2011 | Yahoo Password Frequency Corpus | 130.64 kB (compressed) | txt files |
The dataset contains sanitised password frequency lists from Yahoo, which were obtained in May 2011. |
| [ | 2014 | 500K HTTP Headers | 75 MB | CSV files |
Crawled the top 500K sites (as ranked by Alexa). |
| [ | 2014 | The Drebin Dataset | 6 MB (approx.) | txt log, CSV and XML files |
The goal of the dataset is to promote Android malware research and allow for comparisons of different detection methods. There are 5560 applications in the dataset, representing 179 separate malware families. Between August 2010 and October 2012, the samples were collected. |
| [ | 2008 | Common Crawl | 320 TiB | WARC and ARC format |
Since 2008, the Common Crawl corpus has accumulated petabytes of data. Raw web page data, extracted metadata, and text extractions are all included, composed of over 50 billion web pages. |
Figure 10Electronic information security in mobile networks–open problems.
Figure 11Future research directions—electronic information security in mobile networks.
List of acronyms used in this review along with their definition.
| Acronym | Definition |
|---|---|
| 5G | 5th Generation |
| AE | Autoencoder |
| AI | Artificial Intelligence |
| ANN | Artificial Neural Network |
| BLSTM-RNN | Bidirectional LSTM RNN |
| BM | Boltzmann Machine |
| BP | Back-Propagation |
| CNN | Convolutional Neural Network |
| CPPS | Cyber-Physical Power System |
| DBN | Deep Belief Network |
| DCNN | Deep Convolutional Neural Network |
| DDoS | Distributed Denial of Service |
| DFNN | Deep Feedforward Neural Network |
| DL | Deep Learning |
| DOS | Denial of Service |
| DRL | Deep Reinforcement Learning |
| DT | Decision Tree |
| ELM | Extreme Learning Machine |
| GA | Genetic Algorithm |
| GNN | Graph Neural Network |
| GRA | Grey Relational Analysis |
| GRU | Gated Recurrent Unit |
| ICMP | Internet Control Message Protocol |
| IEEE | Institute of Electrical and Electronics Engineers |
| IET | Institution of Engineering and Technology |
| IDS | Intrusion Detection System |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IS | Information Security |
| IT | Information Technology |
| KNN | K-nearest Neighbour |
| LR | Logistic Regression |
| LSTM | Long Short-Term Memory |
| LTE | Long Term Evolution |
| MIB | Management Information Base |
| ML | Machine Learning |
| MLP | Multilayer Perceptron |
| NB | Naive Bayesian |
| NIDS | Network Intrusion Detection System |
| NLP | Natural Language Processing |
| NN | Neural Networks |
| NoC | Network-on-Chip |
| OCSVM | One Class Support Vector Machine |
| PCA | Principal Component Analysis |
| PHP | Hypertext Pre-processor |
| PLS | Partial Least Squares |
| PRISMA | Preferred Reporting Items for Systematic Reviews and Meta-Analyses |
| PSO | Particle Swarm Optimization |
| RBF | Radial Basis Function |
| RBM | Restricted Boltzmann Machine |
| RF | Reinforcement Learning |
| RL | Reinforcement Learning |
| RNN | Recurrent Neural Network |
| SDN | Software Defined Networking |
| SE | Social Engineering |
| SGD | Stochastic Gradient Descent |
| SLFN | Single Hidden Layer Feedforward Neural Network |
| SMS | Short Message Service |
| SNMP | Simple Network Management Protocol |
| SQL | Structured Query Language |
| SVM | Support Vector Machines |
| TAN | Transaction Authentication Numbers |
| TCP | Transmission Control Protocol |
| TFIDF | Term Frequency Inverse Document Frequency |
| TPR | True Positive Rate |
| UAV | Unmanned Aerial Vehicle |
| UDP | User Datagram Protocol |
| WiNoC | Wireless Network-on-Chip |
| WSN | Wireless Sensor Network |