CLC number: TP393.08
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2023-08-29
Cited: 0
Clicked: 1770
Citations: Bibtex RefMan EndNote GB/T7714
Jie CHEN, Dandan WU, Ruiyun XIE. Artificial intelligence algorithms for cyberspace security applications: a technological and status review[J]. Frontiers of Information Technology & Electronic Engineering, 2023, 24(8): 1117-1142.
@article{title="Artificial intelligence algorithms for cyberspace security applications: a technological and status review",
author="Jie CHEN, Dandan WU, Ruiyun XIE",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="24",
number="8",
pages="1117-1142",
year="2023",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200314"
}
%0 Journal Article
%T Artificial intelligence algorithms for cyberspace security applications: a technological and status review
%A Jie CHEN
%A Dandan WU
%A Ruiyun XIE
%J Frontiers of Information Technology & Electronic Engineering
%V 24
%N 8
%P 1117-1142
%@ 2095-9184
%D 2023
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200314
TY - JOUR
T1 - Artificial intelligence algorithms for cyberspace security applications: a technological and status review
A1 - Jie CHEN
A1 - Dandan WU
A1 - Ruiyun XIE
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 24
IS - 8
SP - 1117
EP - 1142
%@ 2095-9184
Y1 - 2023
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200314
Abstract: Three technical problems should be solved urgently in cyberspace security: the timeliness and accuracy of network attack detection, the credibility assessment and prediction of the security situation, and the effectiveness of security defense strategy optimization. artificial intelligence (AI) algorithms have become the core means to increase the chance of security and improve the network attack and defense ability in the application of cyberspace security. Recently, the breakthrough and application of AI technology have provided a series of advanced approaches for further enhancing network defense ability. This work presents a comprehensive review of AI technology articles for cyberspace security applications, mainly from 2017 to 2022. The papers are selected from a variety of journals and conferences: 52.68% are from Elsevier, Springer, and IEEE journals and 25% are from international conferences. With a specific focus on the latest approaches in machine learning (ML), deep learning (DL), and some popular optimization algorithms, the characteristics of the algorithmic models, performance results, datasets, potential benefits, and limitations are analyzed, and some of the existing challenges are highlighted. This work is intended to provide technical guidance for researchers who would like to obtain the potential of AI technical methods for cyberspace security and to provide tips for the later resolution of specific cyberspace security issues, and a mastery of the current development trends of technology and application and hot issues in the field of network security. It also indicates certain existing challenges and gives directions for addressing them effectively.
[1]Aggarwal P, Thakoor O, Jabbari S, et al., 2022. Designing effective masking strategies for cyberdefense through human experimentation and cognitive models. Comput Secur, 117:102671.
[2]Al-Garadi MA, Mohamed A, Al-Ali AK, et al., 2020. A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun Surv Tut, 22(3):1646-1685.
[3]Al-Omari M, Rawashdeh M, Qutaishat F, et al., 2021. An intelligent tree-based intrusion detection model for cyber security. J Netw Syst Manag, 29(2):20.
[4]Al-Yaseen WL, Othman ZA, Nazri MZA, 2017. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl, 67:296-303.
[5]Andresini G, Appice A, di Mauro N, et al., 2020. Multi-channel deep feature learning for intrusion detection. IEEE Access, 8:53346-53359.
[6]Apruzzese G, Colajanni M, Ferretti L, et al., 2018. On the effectiveness of machine and deep learning for cyber security. Proc 10th Int Conf on Cyber Conflict, p.371-390.
[7]Arshad SA, Murtaza MA, Tahir M, 2012. Fair buffer allocation scheme for integrated wireless sensor and vehicular networks using Markov decision processes. IEEE Vehicular Technology Conf, p.1-5.
[8]Atefi K, Hashim H, Kassim M, 2019. Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network. IEEE 7th Conf on Systems, Process and Control, p.269-274.
[9]Aung YY, Min MM, 2018. Hybrid intrusion detection system using K-means and K-nearest neighbors algorithms. Proc IEEE/ACIS 17th Int Conf on Computer and Information Science, p.34-38.
[10]Bahnsen AC, Torroledo I, Camacho LD, et al., 2018. Simulating malicious AI. Proc Symp on Electronic Crime Research, p.15-17.
[11]Balamurugan E, Mehbodniya A, Kariri E, et al., 2022. Network optimization using defender system in cloud computing security based intrusion detection system with game theory deep neural network (IDSGT-DNN). Patt Recogn Lett, 156:142-151.
[12]Bdrany A, Sadkhan SB, 2020. Decision making approaches in cognitive radio—status, challenges and future trends. Int Conf on Advanced Science and Engineering, p.195-198.
[13]Berman DS, Buczak NL, Chavis JS, et al., 2019. A survey of deep learning methods for cyber security. Information, 10(4):122.
[14]Bhuiyan TH, Medal HR, Nandi AK, et al., 2021. Risk-averse bi-level stochastic network interdiction model for cyber-security risk management. Int J Crit Infrastr Prot, 32:100408.
[15]Bitaab M, Hashemi S, 2017. Hybrid intrusion detection: combining decision tree and Gaussian mixture model. Proc 14th Int ISC (Iranian Society of Cryptology) Conf on Information Security and Cryptology, p.8-12.
[16]Bouhamed O, Bouachir O, Aloqaily M, et al., 2021. Lightweight IDS for UAV networks: a periodic deep reinforcement learning-based approach. IFIP/IEEE Int Symp on Integrated Network Management, p.1032-1037.
[17]Bresniker K, Gavrilovska A, Holt J, et al., 2019. Grand challenge: applying artificial intelligence and machine learning to cybersecurity. Computer, 52(12):45-52.
[18]Buczak AL, Guven E, 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tut, 18(2):1153-1176.
[19]Burke D, 1999. Toward a Game Theory Model of Information Warfare. Technical Report, AFIT/GSS/LAL/99D-1. Airforce Institute of Technology, USA.
[20]Buşoniu L, Babuška R, de Schutter B, 2010. Multi-agent reinforcement learning: an overview. In: Srinivasan D, Jain LC (Eds.), Innovations in Multi-agent Systems and Applications. Springer, Heidelberg, p.183-221.
[21]Cao G, Lu ZM, Wen XM, et al., 2018. AIF: an artificial intelligence framework for smart wireless network management. IEEE Commun Lett, 22(2):400-403.
[22]Challita U, Dong L, Saad W, 2018. Proactive resource management for LTE in unlicensed spectrum: a deep learning perspective. IEEE Trans Wirel Commun, 17(7):4674-4689.
[23]Chen F, Ye ZW, Wang CZ, et al., 2018. A feature selection approach for network intrusion detection based on tree-seed algorithm and K-nearest neighbor. IEEE 4th Int Symp on Wireless Systems within the Int Conf on Intelligent Data Acquisition and Advanced Computing Systems, p.68-72.
[24]Chen SS, Lian YF, Jia W, 2008. A network vulnerability evaluation method based on Bayesian networks. J Univ Chin Acad Sci, 25(5):639-648(in Chinese).
[25]Chen Y, Lin QZ, Wei WH, et al., 2022. Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in fog computing. Knowl-Based Syst, 244:108505.
[26]Chohra A, Shirani P, Karbab EB, et al., 2022. Chameleon: optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput Secur, 117:102684.
[27]Choi YH, Liu P, Shang ZT, et al., 2020. Using deep learning to solve computer security challenges: a survey. Cybersecurity, 3(1):15.
[28]Deng SG, Xiang ZZ, Zhao P, et al., 2020. Dynamical resource allocation in edge for trustable Internet-of-Things systems: a reinforcement learning method. IEEE Trans Ind Inform, 16(9):6103-6113.
[29]Diao WP, 2021. Network security situation forecast model based on neural network algorithm development and verification. IEEE 4th Int Conf on Automation, Electronics and Electrical Engineering, p.462-465.
[30]Ding HW, Chen LY, Dong L, et al., 2022. Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection. Fut Gener Comput Syst, 131:240-254.
[31]Elbes M, Alzubi S, Kanan T, et al., 2019. A survey on particle swarm optimization with emphasis on engineering and network applications. Evol Intell, 12(2):113-129.
[32]Faker O, Dogdu E, 2019. Intrusion detection using big data and deep learning techniques. Proc ACM Southeast Conf, p.86-93.
[33]Garcia AB, Babiceanu RF, Seker R, 2021. Artificial intelligence and machine learning approaches for aviation cybersecurity: an overview. Integrated Communications Navigation and Surveillance Conf, p.1-8.
[34]Gharib A, Sharafaldin I, Lashkari AH, et al., 2016. An evaluation framework for intrusion detection dataset. Proc Int Conf on Information Science and Security, p.1-6.
[35]Goodfellow IJ, Pouget-Abadie J, Mirza M, et al., 2014. Generative adversarial nets. Proc 27th Int Conf on Neural Information Processing Systems, p.2672-2680.
[36]Goodfellow IJ, Bengio Y, Courville A, 2016. Deep Learning. MIT Press, Cambridge, USA.
[37]Graves A, Mohamed AR, Hinton G, 2013. Speech recognition with deep recurrent neural networks. Proc IEEE Int Conf on Acoustics, Speech and Signal Processing, p.6645-6649.
[38]Gronauer S, Diepold K, 2022. Multi‑agent deep reinforcement learning: a survey. Artif Intell Rev, 55:895-943.
[39]Gu YH, Li KY, Guo ZY, et al., 2019. Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access, 7:64351-64365.
[40]Gupta ARB, Agrawal J, 2020. A comprehensive survey on various machine learning methods used for intrusion detection system. IEEE 9th Int Conf on Communication Systems and Network Technologies, p.282-289.
[41]Gupta N, Jindal V, Bedi P, 2022. CSE-IDS: using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. Comput Secur, 112:102499.
[42]Hamrioui S, Bokhari S, 2021. A new cybersecurity strategy for IoE by exploiting an optimization approach. 12th Int Conf on Information and Communication Systems, p.23-28.
[43]He XM, Wang K, Huang HW, et al., 2020. Green resource allocation based on deep reinforcement learning in content-centric IoT. IEEE Trans Emerg Top Comput, 8(3):781-796.
[44]Hessel M, Modayil J, van Hasselt H, et al., 2018. Rainbow: combining improvements in deep reinforcement learning. Proc AAAI Conf on Artificial Intelligence, p.3215-3222.
[45]Hindy H, Atkinson R, Tachtatzis C, et al., 2020. Utilising deep learning techniques for effective zero-day attack detection. Electronics, 9(10):1684.
[46]Ho S, Al Jufout S, Dajani K, et al., 2021. A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J Comput Soc, 2:14-25.
[47]Hossain D, Ochiai H, Doudou F, et al., 2020. SSH and FTP brute-force attacks detection in computer networks: LSTM and machine learning approaches. 5th Int Conf on Computer and Communication Systems, p.491-497.
[48]Hu BW, Zhou CJ, Tian YC, et al., 2021. Decentralized consensus decision-making for cybersecurity protection in multimicrogrid systems. IEEE Trans Syst Man Cybern Syst, 51(4):2187-2198.
[49]Hu CH, Liu GK, Li M, 2021. A network security situation prediction method based on SA-SSA. 14th Int Symp on Computational Intelligence and Design, p.105-110.
[50]Hühn J, Hüllermeier E, 2009. FURIA: an algorithm for unordered fuzzy rule induction. Data Min Knowl Discov, 19(3):293-319.
[51]Huo D, Li XY, Li LH, et al., 2022. The application of 1D-CNN in microsoft malware detection. 7th Int Conf on Big Data Analytics, p.181-187.
[52]Hyder B, Govindarasu M, 2020. Optimization of cybersecurity investment strategies in the smart grid using game-theory. IEEE Power & Energy Society Innovative Smart Grid Technologies Conf, p.1-5.
[53]Issa ASA, Albayrak Z, 2021. CLSTMNet: a deep learning model for intrusion detection. 3rd Int Scientific Conf of Engineering Sciences and Advances Technologies, Article 012244.
[54]Jain M, Kaur G, 2019. A novel distributed semi-supervised approach for detection of network based attacks. 9th Int Conf on Cloud Computing, Data Science & Engineering, p.120-125.
[55]Kan X, Fan YX, Fang ZJ, et al., 2021. A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Inform Sci, 568:147-162.
[56]Khaw YM, Jahromi AA, Arani MFM, et al., 2021. A deep learning-based cyberattack detection system for transmission protective relays. IEEE Trans Smart Grid, 12(3):2554-2565.
[57]Kherlenchimeg Z, Nakaya N, 2018. Network intrusion classifier using autoencoder with recurrent neural network. Proc 4th Int Conf on Electronics and Software Science, p.94-100.
[58]Khoa TV, Saputra YM, Hoang DT, et al., 2020. Collaborative learning model for cyberattack detection systems in IoT Industry 4.0. IEEE Wireless Communications and Networking Conf, p.1-6.
[59]Kim J, Shin Y, Choi E, 2019. An intrusion detection model based on a convolutional neural network. J Multim Inform Syst, 6(4):165-172.
[60]Krizhevsky A, Sutskever I, Hinton GE, 2012. ImageNet classification with deep convolutional neural networks. Proc 25th Int Conf on Neural Information Processing Systems, p.1097-1105. http://doi.org/10.1145/3065386
[61]Kumar N, Zeadally S, Chilamkurti N, et al., 2015. Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud. IEEE Netw, 29(2):62-69.
[62]Kumar VS, Narasimhan VL, 2021. Using deep learning for assessing cybersecurity economic risks in virtual power plants. 7th Int Conf on Electrical Energy Systems, p.530-537.
[63]Kunal, Dua M, 2019. Machine learning approach to IDS: a comprehensive review. 3rd Int Conf on Electronics, Communication and Aerospace Technology, p.117-121.
[64]Kunang YN, Nurmaini S, Stiawan D, et al., 2019. Automatic features extraction using autoencoder in intrusion detection system. Proc Int Conf on Electrical Engineering and Computer Science, p.219-224.
[65]Ledig C, Theis L, Huszár F, et al., 2017. Photo-realistic single image super-resolution using a generative adversarial network. IEEE Conf on Computer Vision and Pattern Recognition, p.105-114.
[66]Li BB, Wu YH, Song JR, et al., 2021. DeepFed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans Ind Inform, 17(8):5615-5624.
[67]Li DT, Feng HY, Gao YH, 2021. A network security evaluation method based on machine learning algorithm. Electr Des Eng, 29(12):138-142, 147(in Chinese).
[68]Li GF, Huang YX, Bie ZH, et al., 2020. Machine-learning-based reliability evaluation framework for power distribution networks. IET Gener Trans Distrib, 14(12):2282-2291.
[69]Liu P, Zang WY, 2003. Incentive-based modeling and inference of attacker intent, objectives, and strategies. Proc 10th ACM Conf on Computer and Communications Security, p.179-189.
[70]Liu XH, Zhang HW, Dong SQ, et al., 2021. Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. Comput Secur, 111:102480.
[71]Liu XX, Zhang JX, Zhu PD, et al., 2021. Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput Secur, 102:102138.
[72]Long J, Shelhamer E, Darrell T, 2015. Fully convolutional networks for semantic segmentation. Proc IEEE Conf on Computer Vision and Pattern Recognition, p.3431-3440.
[73]Luan D, Tan XB, 2021. EWM-IFAHP: an improved network security situation assessment model. 2nd Int Conf on Machine Learning and Computer Application, p.1-6.
[74]Lye KW, Wing J, 2002. Game Strategies in Cyberspace Security. Technical Report, No. CMU-CS-02-136, School of Computer Science, Carnegie Mellon University, Pittsburgh, USA.
[75]Ma PC, Jiang B, Lu ZG, et al., 2021. Cybersecurity named entity recognition using bidirectional long short-term memory with conditional random fields. Tsinghua Sci Technol, 26(3):259-265.
[76]Mehta V, Bartzis C, Zhu HF, et al., 2006. Ranking attack graphs. Proc 9th Int Workshop on Recent Advances in Intrusion Detection, p.127-144.
[77]Mishra P, Varadharajan V, Tupakula U, et al., 2019. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tut, 21(1):686-728.
[78]Mohiuddin MA, Khan SA, Engelbrecht AP, 2016. Fuzzy particle swarm optimization algorithms for the open shortest path first weight setting problem. Appl Intell, 45(3):598-621.
[79]Moizuddin MD, Jose MV, 2022. A bio-inspired hybrid deep learning model for network intrusion detection. Knowl-Based Syst, 238:107894.
[80]Mushtaq E, Zameer A, Umer M, et al., 2022. A two-stage intrusion detection system with auto-encoder and LSTMs. Appl Soft Comput, 121:108768.
[81]Narudin FA, Feizollah A, Anuar NB, et al., 2016. Evaluation of machine learning classifiers for mobile malware detection. Soft Comput, 20(1):343-357.
[82]Nguyen HT, Torrano-Gimenez C, Alvarez G, et al., 2011. Application of the generic feature selection measure in detection of web attacks. In: Herrero Á, Corchado E (Eds.), Computational Intelligence in Security for Information Systems. Springer, Berlin, p.25-32.
[83]Nguyen TTT, Armitage G, 2008. A survey of techniques for Internet traffic classification using machine learning. IEEE Commun Surv Tut, 10(4):56-76.
[84]Nishiyama T, Kumagai A, Kamiya K, et al., 2020. SILU: strategy involving large-scale unlabeled logs for improving malware detector. IEEE Symp on Computers and Communications, p.1-7.
[85]Nisioti A, Mylonas A, Yoo PD, et al., 2018. From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods. IEEE Commun Surv Tut, 20(4):3369-3388.
[86]Olowononi FO, Rawat DB, Liu CM, 2021. Resilient machine learning for networked cyber physical systems: a survey for machine learning security to securing machine learning for CPS. IEEE Commun Surv Tut, 23(1):524-552.
[87]Park JB, Jeong YW, Shin JR, et al., 2010. Closure to discussion of "An improved particle swarm optimization for nonconvex economic dispatch problems." IEEE Trans Power Syst, 25(4):2010-2011.
[88]Pouyanfar S, Sadiq S, Yan YL, et al., 2019. A survey on deep learning: algorithms, techniques, and applications. ACM Comput Surv, 51(5):92.
[89]Pu ZY, 2020. Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. J Supercomput, 76(2):1342-1357.
[90]Qazi EUH, Imran M, Haider N, et al., 2022. An intelligent and efficient network intrusion detection system using deep learning. Comput Electr Eng, 99:107764.
[91]Roopak M, Tian GY, Chambers J, 2019. Deep learning models for cyber security in IoT networks. IEEE 9th Annual Computing and Communication Workshop and Conf, p.452-457.
[92]Sagar BS, Niranjan S, Kashyap N, et al., 2019. Providing cyber security using artificial intelligence—a survey. 3rd Int Conf on Computing Methodologies and Communication, p.717-720.
[93]Salih A, Zeebaree ST, Ameen S, et al., 2021. A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection. 7th Int Engineering Conf "Research & Innovation amid Global Pandemic", p.61-66.
[94]Sapavath NN, Muhati E, Rawat DB, 2021. Prediction and detection of cyberattacks using AI model in virtualized wireless networks. 8th IEEE Int Conf on Cyber Security and Cloud Computing (CSCloud)/7th IEEE Int Conf on Edge Computing and Scalable Cloud, p.97-102. https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00027
[95]Seth JK, Chandra S, 2018. MIDS: metaheuristic based intrusion detection system for cloud using k-NN and MGWO. 2nd Int Conf on Advances in Computing and Data Sciences, p.411-420.
[96]Shafiqur R, Salman K, Luai MA, 2020. The effect of acceleration coefficients in particle swarm optimization algorithm with application to wind farm layout design. FME Trans, 48(4):922-930.
[97]Shaikh RA, Shashikala SV, 2019. An autoencoder and LSTM based intrusion detection approach against denial of service attacks. Proc 1st Int Conf on Advances in Information Technology, p.406-410.
[98]Shende S, Thorat S, 2020. A review on deep learning method for intrusion detection in network security. 2nd Int Conf on Innovative Mechanisms for Industry Applications, p.173-177.
[99]Socher R, Huang EH, Pennington J, et al., 2011a. Dynamic pooling and unfolding recursive autoencoders for paraphrase detection. Proc 24th Int Conf on Neural Information Processing Systems, p.801-809.
[100]Socher R, Lin CCY, Ng AY, et al., 2011b. Parsing natural scenes and natural language with recursive neural networks. Proc 28th Int Conf on Machine Learning, p.129-136.
[101]Stampa G, Arias M, Sanchez-Charles D, et al., 2017. A deep-reinforcement learning approach for software-defined networking routing optimization. https://arxiv.org/abs/1709.07080
[102]Stevens-Navarro E, Lin YX, Wong VWS, 2008. An MDP-based vertical handoff decision algorithm for heterogeneous wireless networks. IEEE Trans Veh Technol, 57(2):1243-1254.
[103]Su JY, 2021. Intelligent network security situation prediction method based on deep reinforcement learning. IEEE Int Conf on Industrial Application of Artificial Intelligence, p.343-348.
[104]Sun YY, Liu JJ, Wang JD, et al., 2020. When machine learning meets privacy in 6G: a survey. IEEE Commun Surv Tut, 22(4):2694-2724.
[105]Sutskever I, Vinyals O, Le QV, 2014. Sequence to sequence learning with neural networks. Proc 27th Int Conf on Neural Information Processing Systems, p.3104-3112.
[106]Tekerek T, 2021. A novel architecture for web-based attack detection using convolutional neural network. Comput Secur, 100:102096.
[107]Torres JM, Comesaña CI, García-Nieto PJ, 2019. Review: machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern, 10(10):2823-2836.
[108]Touhiduzzaman M, Hahn A, Srivastava AK, 2019. A diversity-based substation cyber defense strategy utilizing coloring games. IEEE Trans Smart Grid, 10(5):5405-5415.
[109]Ullah F, Naeem H, Jabbar S, et al., 2019. Cyber security threats detection in Internet of Things using deep learning approach. IEEE Access, 7:124379-124389.
[110]Waibel A, Hanazawa T, Hinton G, et al., 1990. Phoneme recognition using time-delay neural networks. In: Waibe A, Lee KF (Eds.), Readings in Speech Recognition. Elsevier, Amsterdam, the Netherlands, p.393-404.
[111]Wang JH, Shan ZL, Tan HS, et al., 2021. Network security situation assessment based on genetic optimized PNN neural network. Comput Sci, 48(6):338-342(in Chinese).
[112]Wang PY, Govindarasu M, 2020. Multi-agent based attack-resilient system integrity protection for smart grid. IEEE Trans Smart Grid, 11(4):3447-3456.
[113]Wei MH, 2021. A new information security evaluation algorithm based on recurrent neural. J Mianyang Teach Coll, 40(2):75-80, 87(in Chinese).
[114]Wei YF, Yu FR, Song M, et al., 2019. Joint optimization of caching, computing, and radio resources for fog-enabled IoT using natural actor-critic deep reinforcement learning. IEEE Int Things J, 6(2):2061-2073.
[115]Wickramasinghe CS, Marino DL, Amarasinghe K, et al., 2018. Generalization of deep learning for cyber-physical system security: a survey. Proc 44th Annual Conf of the IEEE Industrial Electronics Society, p.745-751.
[116]Wu SX, Banzhaf W, 2010. The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput, 10(1):1-35.
[117]Xiao JP, Long C, Zhao J, et al., 2021. Survey of network intrusion detection based on deep learning. Front Data Comput, 3(3):59-74(in Chinese).
[118]Xin Y, Kong LS, Liu Z, et al., 2018. Machine learning and deep learning methods for cybersecurity. IEEE Access, 6:35365-35381.
[119]Yang HY, Zeng RY, 2021. Method for assessment of network security situation with deep learning. J Xidian Univ, 48(1):183-190(in Chinese).
[120]Yang HY, Zeng RY, Xu GQ, et al., 2021. A network security situation assessment method based on adversarial deep learning. Appl Soft Comput, 102:107096.
[121]Yang HY, Zhang ZX, Zhang L, 2022a. Network security situation assessment based on deep weighted feature learning. J Cyber Secur, 7(4):32-43(in Chinese).
[122]Yang HY, Zhang ZX, Zhang L, 2022b. Network security situation assessments with parallel feature extraction and an improved BiGRU. J Tsinghua Univ (Sci Technol), 62(5):842-848(in Chinese).
[123]Yang XJ, Jia YM, 2021. IPSO-LSTM: a new Internet security situation prediction model. 2nd Int Conf on Machine Learning and Computer Application, p.1-5.
[124]Ye L, Tan ZJ, 2019. A method of network security situation assessment based on deep learning. Intell Comput Appl, 9(6):73-75, 82(in Chinese).
[125]Yeom S, Kim K, 2019. Detail analysis on machine learning based malicious network traffic classification. Proc 8th Int Conf on Smart Media & Applications, p.49-53.
[126]Zeadally S, Adi E, Baig Z, et al., 2020. Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access, 8:23817-23837.
[127]Zhang HY, Lin KY, Chen WW, et al., 2019. Using machine learning techniques to improve intrusion detection accuracy. IEEE 2nd Int Conf on Knowledge Innovation and Invention, p.308-310.
[128]Zhang M, Xu BY, Bai S, et al., 2017. A deep learning method to detect web attacks using a specially designed CNN. Proc 24th Int Conf on Neural Information Processing, p.828-836.
[129]Zhang R, Wang YB, 2016. Research on machine learning with algorithm and development. J Commun Univ China (Sci Technol), 23(2):10-18, 24(in Chinese).
[130]Zhang R, Pan ZH, Yin YF, 2021. Research on assessment algorithm for network security situation based on SSA-BP neural network. 7th Int Symp on System and Software Reliability, p.140-145.
[131]Zhang R, Pan ZH, Yin YF, et al., 2022. Network security situation assessment model based on SAA-SSA-BPNN. Comput Eng Appl, 58(11):117-124(in Chinese).
[132]Zhang ZQ, 2021. Research on network security situation prediction based on improved and optimized BP neural network. 2nd Int Conf on Electronics, Communications and Information Technology, p.1014-1018.
[133]Zhou XY, Belkin M, 2014. Semi-supervised learning. Acad Press Libr Signal Process, 1:1239-1269.
[134]Zhou ZH, 2016. Machine Learning. Tsinghua University Press, Beijing, China, p.390-392(in Chinese).
Open peer comments: Debate/Discuss/Question/Opinion
<1>