{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:30:21Z","timestamp":1771266621084,"version":"3.50.1"},"reference-count":84,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p>In this article, a review and summarization of the emerging scientific approaches of deep learning (DL) on cybersecurity are provided, a structured and comprehensive overview of the various cyberattack detection methods is conducted, existing cyberattack detection methods based on DL is categorized. Methods covering attacks to deep learning based on generative adversarial networks (GAN) are investigated. The datasets used for the evaluation of the efficiency proposed by researchers for cyberattack detection methods are discussed. The statistical analysis of papers published on cybersecurity with the application of DL over the years is conducted. Existing commercial cybersecurity solutions developed on deep learning are described.<\/jats:p>","DOI":"10.4018\/ijcwt.2020040105","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:56:47Z","timestamp":1583510207000},"page":"82-105","source":"Crossref","is-referenced-by-count":17,"title":["Deep Learning in Cybersecurity"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3710-1046","authenticated-orcid":true,"given":"Yadigar N.","family":"Imamverdiyev","sequence":"first","affiliation":[{"name":"Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2288-6255","authenticated-orcid":true,"given":"Fargana J.","family":"Abdullayeva","sequence":"additional","affiliation":[{"name":"Institute of Information Technology of Azerbaijan National Academy of Sciences, Baku, Azerbaijan"}]}],"member":"2432","reference":[{"key":"IJCWT.2020040105-0","doi-asserted-by":"crossref","unstructured":"Aditham, S., Ranganathan, N., & Katkoori, S. (2017). LSTM-based memory profiling for predicting data attacks in distributed Big Data systems. In Proccedings of the IEEE international parallel and distributed processing symposium workshops (pp. 1259-1267). IEEE Press.","DOI":"10.1109\/IPDPSW.2017.76"},{"key":"IJCWT.2020040105-1","doi-asserted-by":"crossref","unstructured":"AL-Hawawreh, M., Moustafa, N., & Sitnikova, E. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of information security and applications, 41, 1-11.","DOI":"10.1016\/j.jisa.2018.05.002"},{"key":"IJCWT.2020040105-2","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2019.097396"},{"key":"IJCWT.2020040105-3","unstructured":"Almeida, D. M. (2016). Malware classification on time series data through machine learning [thesis]. Faculdade de Engenharia da Universidade Do Porto."},{"key":"IJCWT.2020040105-4","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"IJCWT.2020040105-5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"IJCWT.2020040105-6","unstructured":"Aminanto, M. E. & Kim, K. (2016). Deep Learning in intrusion detection system: An overview. In Proccedings of the international research conference on engineering and technology (pp. 1-12). Academic Press."},{"key":"IJCWT.2020040105-7","unstructured":"Aminanto, M. E., & Kim, K. (2016). Deep Learning-based feature selection for intrusion detection system in transport layer. In Proceedings of the Korea Institutes of Information Security and Cryptology Conference (pp. 740-743). Academic Press."},{"key":"IJCWT.2020040105-8","doi-asserted-by":"crossref","unstructured":"Anderson, H. S., Woodbridge, J., & Filar, B. (2016). DeepDGA: Adversarially-tuned domain generation and detection. In Proccedings of the ACM workshop on artificial \u0131ntelligence and security (pp. 13-21). ACM.","DOI":"10.1145\/2996758.2996767"},{"key":"IJCWT.2020040105-9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08389-6_9"},{"key":"IJCWT.2020040105-10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"IJCWT.2020040105-11","doi-asserted-by":"publisher","DOI":"10.1145\/3190645.3190692"},{"key":"IJCWT.2020040105-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.06.032"},{"key":"IJCWT.2020040105-13","article-title":"Cyberattack detection using deep generative models with variational inference.","author":"S. E.Chandy","year":"2018","journal-title":"Journal of Water Resources Planning and Management"},{"key":"IJCWT.2020040105-14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785326"},{"key":"IJCWT.2020040105-15","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249084"},{"key":"IJCWT.2020040105-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.156"},{"key":"IJCWT.2020040105-17","year":"2009","journal-title":"Assuring a Trusted and Resilient Information and Communications Infrastructure"},{"key":"IJCWT.2020040105-18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"IJCWT.2020040105-19","doi-asserted-by":"crossref","unstructured":"David, O. E. & Netanyahu, N. S. (2015). DeepSign: Deep Learning for automatic malware signature generation and classification. In Proccedings of the IEEE international joint conference on neural networks (pp. 1-8). IEEE Press.","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"IJCWT.2020040105-20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"IJCWT.2020040105-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"IJCWT.2020040105-22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"IJCWT.2020040105-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"IJCWT.2020040105-24","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"IJCWT.2020040105-25","unstructured":"Gibert, D. (2016). Convolutional neural networks for malware classification [Master's thesis]. Universitat Polit\u00e8cnica de Catalunya."},{"key":"IJCWT.2020040105-26","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Hu, B., Warde-Farley, D., Ozair, S., . . . Bengio, Y. (2014). Generative adversarial nets. In Proccedings of the 27th international conference on neural information processing systems (pp. 2672-2680). Academic Press."},{"key":"IJCWT.2020040105-27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7844-6_11"},{"key":"IJCWT.2020040105-28","unstructured":"Hardy, W., Chen, L., Hou, S., Ye, Y., & Li, X. (2016). DL4MD: A Deep Learning framework for intelligent malware detection. In Proceedings of the International Conference on Data Mining (pp.61-67). Academic Press."},{"key":"IJCWT.2020040105-29","unstructured":"Hu, W. & Tan, Y. (2017). Black-box attacks against RNN based malware detection algorithms."},{"key":"IJCWT.2020040105-30","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-015-0923-9"},{"key":"IJCWT.2020040105-31","doi-asserted-by":"crossref","unstructured":"Huang, W. & Stokes, J. W. (2016). MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. In Proccedings of the 13th international conference on detection of intrusions and malware, and vulnerability assessment (pp. 399-418). Academic Press.","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"IJCWT.2020040105-32","doi-asserted-by":"publisher","DOI":"10.1089\/big.2018.0023"},{"key":"IJCWT.2020040105-33","unstructured":"Jung, W., Kim, S., & Choi, S. (2015). Poster: Deep learning for zero-day flash malware detection. In Proccedings of the 36th IEEE symposium on security and privacy (pp. 1-2). IEEE Press."},{"key":"IJCWT.2020040105-34","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"IJCWT.2020040105-35","unstructured":"Kim, G., Yi, H., Lee, J., Paek, Y., & Yoon, S. (2016). LSTM-based system-call language modeling and robust ensemble method for designing host-based \u0131ntrusion detection systems."},{"key":"IJCWT.2020040105-36","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"IJCWT.2020040105-37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.004"},{"key":"IJCWT.2020040105-38","doi-asserted-by":"crossref","unstructured":"Kobojek, P. & Saeed K. (2016). Application of recurrent neural networks for user verification based on keystroke dynamics. Journal of telecommunications and \u0131nformation technology, (3), 60-70.","DOI":"10.26636\/jtit.2016.3.750"},{"key":"IJCWT.2020040105-39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"IJCWT.2020040105-40","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.21"},{"key":"IJCWT.2020040105-41","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171594"},{"issue":"3","key":"IJCWT.2020040105-42","first-page":"1377","article-title":"Financial weapons of war.","volume":"102","author":"T. C.Lin","year":"2016","journal-title":"Minnesota Law Review"},{"key":"IJCWT.2020040105-43","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280825"},{"key":"IJCWT.2020040105-44","doi-asserted-by":"publisher","DOI":"10.3390\/s16101701"},{"key":"IJCWT.2020040105-45","unstructured":"Microsoft Malware Classification Challenge (BIG 2015). (n.d.). Retrieved from https:\/\/www.kaggle.com\/c\/malware-classification"},{"key":"IJCWT.2020040105-46","doi-asserted-by":"crossref","unstructured":"Mirsky Y., Doitshman T., Elovici Y., & Shabtai A. (2018). Kitsune: An ensemble of autoencoders for online network \u0131ntrusion detection.","DOI":"10.14722\/ndss.2018.23204"},{"key":"IJCWT.2020040105-47","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., & Ng, A. Y. (2011). Reading digits in natural images with unsupervised feature learning. In Proccedings of the NIPS workshop on deep learning and unsupervised feature learning (pp. 1-9). Academic Press."},{"key":"IJCWT.2020040105-48","unstructured":"Niyaz, Q., Sun, W., Javaid, A. Y., & Alam, M. (2016). A Deep Learning approach for network \u0131ntrusion detection system. In Proccedings of the 9th EAI \u0131nternational conference on bio-inspired \u0131nformation and communications technologies (pp. 21-26). Academic Press."},{"key":"IJCWT.2020040105-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"IJCWT.2020040105-50","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"IJCWT.2020040105-51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"IJCWT.2020040105-52","doi-asserted-by":"crossref","unstructured":"Pibre, L., Pasquet, J., Ienco, D., & Chaumont, M. (2016). Deep Learning is a good steganalysis tool when embedding key is reused for different \u0131mages, even if there is a cover source mismatch, Media watermarking, security, and forensics. In Proceedings of the IS&T International symposium on electronic imaging (pp. 1-12). Academic Press.","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"key":"IJCWT.2020040105-53","doi-asserted-by":"crossref","unstructured":"Rhode, M., Burnap, P., & Jones, K. (2017). Early-stage malware prediction using Recurrent Neural Networks.","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"IJCWT.2020040105-54","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2013.171"},{"key":"IJCWT.2020040105-55","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"IJCWT.2020040105-56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"IJCWT.2020040105-57","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"IJCWT.2020040105-58","unstructured":"Silva, L.A., Costa, K.A., Ribeiro, P.B., Rosa, G.H., & Papa, J.P. (2016). Learning spam features using restricted Boltzmann machines. IADIS International journal on computer science and \u0131nformation systems, 11(1), 99-114."},{"key":"IJCWT.2020040105-59","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"IJCWT.2020040105-60","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"IJCWT.2020040105-61","unstructured":"Teyou, G.K. & Ziazet, J. (2019). Convolutional neural network for intrusion detection system in cyber physical systems."},{"key":"IJCWT.2020040105-62","unstructured":"The CTU-13 dataset. (n.d.). Retrieved from https:\/\/stratosphereips.org\/category\/dataset.html"},{"key":"IJCWT.2020040105-63","unstructured":"The UNB ISCX 2012 intrusion detection evaluation dataset. (n.d.). Retrieved from http:\/\/www.unb.ca\/cic\/research\/datasets\/ids.html"},{"key":"IJCWT.2020040105-64","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"IJCWT.2020040105-65","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"IJCWT.2020040105-66","doi-asserted-by":"publisher","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"IJCWT.2020040105-67","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125846"},{"key":"IJCWT.2020040105-68","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169431"},{"key":"IJCWT.2020040105-69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"IJCWT.2020040105-70","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., & Sheng, Y. (2017). Malware traffic classification using convolutional neural network for representation learning. In Proccedings of the international conference on \u0131nformation networking (pp. 712-717). Academic Press.","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"IJCWT.2020040105-71","unstructured":"Wang, X., & Yiu, S. M. (2018). A multi-task learning model for malware classification with useful file access pattern from api call sequence."},{"key":"IJCWT.2020040105-72","author":"Z.Wang","year":"2015","journal-title":"The applications of deep learning on traffic identification"},{"key":"IJCWT.2020040105-73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56991-8_51"},{"key":"IJCWT.2020040105-74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTICT.2016.7514608"},{"key":"IJCWT.2020040105-75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.001"},{"key":"IJCWT.2020040105-76","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.513-517.579"},{"key":"IJCWT.2020040105-77","doi-asserted-by":"crossref","unstructured":"Yousefi-Azar M., Varadharajan V., Hamey L., & Tupakula U. (2017). Autoencoder-based feature learning for cyber security applications. In Proccedings of the IEEE \u0131nternational joint conference on neural networks (pp. 3854-3861). IEEE Press.","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"IJCWT.2020040105-78","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4184196"},{"key":"IJCWT.2020040105-79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67422-3_13"},{"key":"IJCWT.2020040105-80","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"issue":"2","key":"IJCWT.2020040105-81","first-page":"1","article-title":"Malware detection based on deep learning algorithm.","volume":"31","author":"D.Yuxin","year":"2017","journal-title":"Neural Computing & Applications"},{"key":"IJCWT.2020040105-82","unstructured":"Zaheer, M., Tristan, J.B., Wick, M., Guy, L., & Steele, G.L., Jr. (2016). Learning a static analyzer: A case study on a toy language. In Proccedings of the international conference on learning representations (pp. 1-10). Academic Press."},{"key":"IJCWT.2020040105-83","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-017-1053-3"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=250907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T19:20:43Z","timestamp":1722540043000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCWT.2020040105"}},"subtitle":["Challenges and Approaches"],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":84,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2020040105","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}