10,840
Views
1
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

ORCID Icon
Article: 2272358 | Received 22 Jun 2023, Accepted 15 Oct 2023, Published online: 25 Oct 2023

References

  • Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198. https://doi.org/10.3390/electronics11020198
  • Abiodun, O. I., Jantan, A., Omolara, A. E., Dada, K. V., Mohamed, N. A., & Arshad, H. (2018). State-of-the-art in artificial neural network applications: A survey. Heliyon, 4(11), e00938. https://doi.org/10.1016/j.heliyon.2018.e00938
  • Acosta, M. R. C., Ahmed, S., Garcia, C. E., & Koo, I. (2020). Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks. Institute of Electrical and Electronics Engineers Access, 8, 19921–30. https://doi.org/10.1109/ACCESS.2020.2968934
  • Afrifa, S., Varadarajan, V., Appiahene, P., Zhang, T., & Domfeh, E. A. (2023). Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers. Eng, 4(1), 650–664. https://doi.org/10.3390/eng4010039
  • Agrawal, V., Hazratifard, M., Elmiligi, H., & Gebali, F. (2023). ElectroCardioGram (ECG)-based user authentication using deep learning algorithms. Diagnostics, 13(3), 439. https://www.mdpi.com/2075-4418/13/3/439
  • Al Ahdal, A., Rakhra, M., Rajendran, R. R., Arslan, F., Khder, M. A., Patel, B. … Jain, R. (2023). Monitoring cardiovascular problems in heart patients using machine learning. Journal of Healthcare Engineering, 2023, 1–15. https://doi.org/10.1155/2023/9738123
  • Alahmadi, A. N., Rehman, S. U., Alhazmi, H. S., Glynn, D. G., Shoaib, H., & Solé, P. (2022). Cyber-security threats and Side-Channel attacks for digital Agriculture. Sensors, 22(9), 3520. https://doi.org/10.3390/s22093520
  • Aldhyani, T. H., & Alkahtani, H. (2023). Cyber security for detecting distributed denial of service attacks in agriculture 4.0: Deep learning model. Mathematics, 11(1), 233. https://doi.org/10.3390/math11010233
  • Aldhyani, T. H., Khan, M. A., Almaiah, M. A., Alnazzawi, N., Hwaitat, A. K. A., Elhag, A. … Alshebami, A. S. (2023). A secure Internet of medical things framework for breast cancer detection in sustainable smart cities. Electronics, 12(4), 858. https://doi.org/10.3390/electronics12040858
  • Ali, Z. A., Yang, C., Israr, A., & Zhu, Q. (2023). A comprehensive review of scab disease detection on Rosaceae family fruits via UAV imagery. Drones, 7(2), 97. https://doi.org/10.3390/drones7020097
  • Alsheikh, M., Konieczny, L., Prater, M., Smith, G., & Uludag, S. (2021). The state of IoT security: Unequivocal appeal to cybercriminals, onerous to defenders. IEEE Consumer Electronics Magazine, 11(3), 59–68. https://doi.org/10.1109/MCE.2021.3079635
  • AlZu’bi, S., Elbes, M., Mughaid, A., Bdair, N., Abualigah, L., Forestiero, A., & Zitar, R. A. (2023). Diabetes monitoring system in smart health cities based on Big data intelligence. Future Internet, 15(2), 85. https://doi.org/10.3390/fi15020085
  • Alzughaibi, S., & El Khediri, S. (2023). A cloud intrusion detection systems based on DNN using backpropagation and PSO on the CSE-CIC-IDS2018 dataset. Applied Sciences, 13(4), 2276. https://doi.org/10.3390/app13042276
  • Aneja, N., Aneja, S., Bhargava, B., & Shuja, J. (2023). AI-Enabled learning Architecture using network traffic Traces over IoT network: A comprehensive review. Wireless Communications and Mobile Computing, 2023, 1–12. https://doi.org/10.1155/2023/8658278
  • Benzaid, C., & Taleb, T. (2020). AI for beyond 5G networks: A cyber-security defense or offense enabler? IEEE Network, 34(6), 140–147. https://doi.org/10.1109/MNET.011.2000088
  • Bhattacharya, M., Penica, M., O’Connell, E., Southern, M., & Hayes, M. (2023). Human-in-Loop: A review of smart manufacturing deployments. Systems, 11(1), 35. https://doi.org/10.3390/systems11010035
  • Brás, J., Pereira, R., & Moro, S. (2023). Intelligent process automation and business continuity: Areas for future research. Information, 14(2), 122. https://doi.org/10.3390/info14020122
  • Bresniker, K., Gavrilovska, A., Holt, J., Milojicic, D., & Tran, T. (2019). Grand challenge: Applying artificial intelligence and machine learning to cybersecurity. Computer, 52(12), 45–52. https://doi.org/10.1109/MC.2019.2942584
  • Chaddad, A., Peng, J., Xu, J., & Bouridane, A. (2023). Survey of explainable AI techniques in Healthcare. Sensors, 23(2), 634. https://doi.org/10.3390/s23020634
  • Djenna, A., Harous, S., & Saidouni, D. E. (2021). Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Applied Sciences, 11(10), 4580. https://doi.org/10.3390/app11104580
  • Dutta, A., & Kant, S. (2020). An overview of cyber threat intelligence platform and role of artificial intelligence and machine learning. In Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings 16 (pp. 81–86). Springer International Publishing.
  • Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L. D., Pirker, M., Priebe, T., … &Mercaldo, F. (2021, July). Towards resilient artificial intelligence: Survey and research issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece (pp. 536–542). IEEE.
  • ElKashlan, M., Elsayed, M. S., Jurcut, A. D., & Azer, M. (2023). A machine learning-based intrusion detection system for IoT Electric Vehicle Charging Stations (EVCSs). Electronics, 12(4), 1044. https://doi.org/10.3390/electronics12041044
  • Feeken, L., Kern, E., Szanto, A., Winnicki, A., Kao, C. Y., Wudka, B. … Burghardt, C. (2022). Detecting and Processing anomalies in a factory of the future. Applied Sciences, 12(16), 8181. https://doi.org/10.3390/app12168181
  • Figueiredo, J., Serrão, C., & de Almeida, A. M. (2023). Deep learning model transposition for network intrusion detection systems. Electronics, 12(2), 293. https://doi.org/10.3390/electronics12020293
  • Gebremariam, G. G., Panda, J., Indu, S., & Prieto, J. (2023). Blockchain-based Secure Localization against malicious nodes in IoT-Based Wireless sensor networks using federated learning. Wireless Communications and Mobile Computing, 2023, 1–27. https://doi.org/10.1155/2023/8068038
  • Ghimire, B., & Rawat, D. B. (2022). Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet of Things Journal, 9(11), 8229–8249. https://doi.org/10.1109/JIOT.2022.3150363
  • Gregorczyk, M., Żórawski, P., Nowakowski, P., Cabaj, K., & Mazurczyk, W. (2020). Sniffing detection based on network traffic probing and machine learning. Institute of Electrical and Electronics Engineers Access, 8, 149255–149269. https://doi.org/10.1109/ACCESS.2020.3016076
  • Gupta, C., Johri, I., Srinivasan, K., Hu, Y. C., Qaisar, S. M., & Huang, K. Y. (2022). A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors, 22(5), 2017. https://doi.org/10.3390/s22052017
  • Hashem, I. A. T., Usmani, R. S. A., Almutairi, M. S., Ibrahim, A. O., Zakari, A., Alotaibi, F. … Chiroma, H. (2023). Urban Computing for sustainable smart cities: Recent advances. Taxonomy, and Open Research Challenges Sustainability, 15(5), 3916. https://doi.org/10.3390/su15053916
  • Heigl, M., Weigelt, E., Fiala, D., & Schramm, M. (2021). Unsupervised feature selection for outlier detection on streaming data to enhance network security. Applied Sciences, 11(24), 12073. https://doi.org/10.3390/app112412073
  • Karimipour, H., Dehghantanha, A., Parizi, R. M., Choo, K. K. R., & Leung, H. (2019). A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. Institute of Electrical and Electronics Engineers Access, 7, 80778–80788. https://doi.org/10.1109/ACCESS.2019.2920326
  • Katz, M., Pirinen, P., &Posti, H. (2019, August). Towards 6G: Getting ready for the next decade. Proceedings of the 2019 16th International symposium on wireless communication systems (ISWCS), Oulu, Finland (pp. 714–718). IEEE.
  • Kornaros, G. (2022). Hardware-assisted machine learning in resource-constrained IoT environments for security: Review and future prospective. IEEE Access.
  • Koryzis, D., Margaris, D., Vassilakis, C., Kotis, K., & Spiliotopoulos, D. (2023). Disruptive technologies for parliaments: A literature review. Future Internet, 15(2), 66. https://doi.org/10.3390/fi15020066
  • Koufos, K., EI Haloui, K., Dianati, M., Higgins, M., Elmirghani, J., Imran, M. A., & Tafazolli, R. (2021). Trends in intelligent communication systems: Review of standards, major research projects, and identification of research gaps. Journal of Sensor & Actuator Networks, 10(4), 60. https://doi.org/10.3390/jsan10040060
  • Kseniia, N., &Minbaleev, A. (2020, September). Legal support of cybersecurity in the field of application of artificial intelligence technology. Proceedings of the 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), Yaroslavl, Russia (pp. 59–62). IEEE.
  • Kuleto, V., Ilić, M., Dumangiu, M., Ranković, M., Martins, O. M., Păun, D., & Mihoreanu, L. (2021). Exploring opportunities and challenges of artificial intelligence and machine learning in higher education institutions. Sustainability, 13(18), 10424. https://doi.org/10.3390/su131810424
  • Kyrkou, C., Papachristodoulou, A., Kloukiniotis, A., Papandreou, A., Lalos, A., Moustakas, K., &Theocharides, T. (2020, July). Towards artificial-intelligence-based cybersecurity for robustifying automated driving systems against camera sensor attacks. Proceedings of the 2020 IEEE computer society annual symposium on VLSI (ISVLSI), Limassol, Cyprus (pp. 476–481). IEEE.
  • Larriva-Novo, X., Villagrá, V. A., Vega-Barbas, M., Rivera, D., & Sanz Rodrigo, M. (2021). An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets. Sensors, 21(2), 656. 656.Mohammed, I. A. (2020). Artificial intelligence for cybersecurity: A systematic mapping of literature. ARTIFICIAL INTELLIGENCE, 7(9). https://doi.org/10.3390/s21020656
  • Machin, J., Batista, E., Martínez-Ballesté, A., & Solanas, A. (2021). Privacy and security in cognitive cities: A systematic review. Applied Sciences, 11(10), 4471. https://doi.org/10.3390/app11104471
  • Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2021). Artificial intelligence and blockchain for future cybersecurity applications (Vol. 90). Springer Nature.
  • Mazhar, T., Irfan, H. M., Khan, S., Haq, I., Ullah, I., Iqbal, M., & Hamam, H. (2023). Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods. Future Internet, 15(2), 83. https://doi.org/10.3390/fi15020083
  • Mazhar, T., Muhammad Irfan, H., Haq, I., Ullah, I., Ashraf, M., Al Shloul, T., Yasin Ghadi, Y., & Elkamchouchi, D. H. (2023). Analysis of challenges and solutions of IoT in smart grids using AI and machine learning techniques: A review. Electronics, 12(1), 242.
  • Mijwil, M., & Aljanabi, M. (2023). Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime. Iraqi Journal for Computer Science and Mathematics, 4(1), 65–70.
  • Mijwil, M., Salem, I. E., & Ismaeel, M. M. (2023). The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review. Iraqi Journal for Computer Science and Mathematics, 4(1), 87–101.
  • Mironeanu, C., Archip, A., Amarandei, C. M., & Craus, M. (2021). Experimental cyber attack detection framework. Electronics, 10(14), 1682. https://doi.org/10.3390/electronics10141682
  • Mohamed, N., Awasthi, A., Kulkarni, N., Thota, S., Singh, M., & Dhole, S. V. (2022). Decision tree based data pruning with the estimation of oversampling attributes for the secure communication in IOT. International Journal of Intelligent Systems and Applications in Engineering, 10(2s), 212–216.
  • Mohamed, N., Kumar, K. S., Sharma, S., Kumar, R. D., Mehta, S., & Mishra, I. (2022). Wireless Sensor network security with the probability based neighbourhood estimation. International Journal of Intelligent Systems and Applications in Engineering, 10(2s), 231–235.
  • Munir, M. S., Dipro, S. H., Hasan, K., Islam, T., & Shetty, S. (2023). Artificial intelligence-enabled exploratory cyber-physical safety analyzer framework for civilian urban air mobility. Applied Sciences, 13(2), 755. https://doi.org/10.3390/app13020755
  • Namiot, D., Ilyushin, E., & Chizhov, I. (2022). Artificial intelligence and cybersecurity. International Journal of Open Information Technologies, 10(9), 135–147.
  • Nguyen, D. C., Ding, M., Pham, Q. V., Pathirana, P. N., Le, L. B., Seneviratne, A. … Poor, H. V. (2021). Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal, 8(16), 12806–12825. https://doi.org/10.1109/JIOT.2021.3072611
  • Nikoloudakis, Y., Kefaloukos, I., Klados, S., Panagiotakis, S., Pallis, E., Skianis, C., & Markakis, E. K. (2021). Towards a machine learning based situational awareness framework for cybersecurity: An SDN implementation. Sensors, 21(14), 4939. https://doi.org/10.3390/s21144939
  • Oliveira, N., Praça, I., Maia, E., & Sousa, O. (2021). Intelligent cyber attack detection and classification for network-based intrusion detection systems. Applied Sciences, 11(4), 1674. https://doi.org/10.3390/app11041674
  • Pinto, A., Herrera, L. C., Donoso, Y., & Gutierrez, J. A. (2023). Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure. Sensors, 23(5), 2415. https://doi.org/10.3390/s23052415
  • Preuveneers, D., & Joosen, W. (2021). Sharing machine learning models as indicators of compromise for cyber threat intelligence. Journal of Cybersecurity and Privacy, 1(1), 140–163. https://doi.org/10.3390/jcp1010008
  • Rahman, M. A., Saleh, T., Jahan, M. P., McGarry, C., Chaudhari, A., Huang, R. … Shakur, M. S. (2023). Review of intelligence for additive and subtractive manufacturing: Current status and future prospects. Micromachines, 14(3), 508. https://doi.org/10.3390/mi14030508
  • Rawal, A., McCoy, J., Rawat, D. B., Sadler, B. M., & Amant, R. S. (2021). Recent advances in trustworthy explainable artificial intelligence: Status, challenges, and perspectives. IEEE Transactions on Artificial Intelligence, 3(6), 852–866. https://doi.org/10.1109/TAI.2021.3133846
  • Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055–2072. https://doi.org/10.1109/TSC.2019.2907247
  • Rawindaran, N., Jayal, A., & Prakash, E. (2021). Machine learning cybersecurity adoption in small and medium enterprises in developed countries. Computers, 10(11), 150. https://doi.org/10.3390/computers10110150
  • Ryalat, M., ElMoaqet, H., & AlFaouri, M. (2023). Design of a smart factory based on cyber-physical systems and Internet of things towards industry 4.0. Applied Sciences, 13(4), 2156. https://doi.org/10.3390/app13042156
  • Santhosh Kumar, S. V. N., Selvi, M., Kannan, A., & Doulamis, A. D. (2023). A comprehensive survey on machine learning-based intrusion detection systems for secure communication in Internet of things. Computational Intelligence and Neuroscience, 2023, 1–24. https://doi.org/10.1155/2023/8981988
  • Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). Ai-driven cybersecurity: An overview, security intelligence modeling and research directions. SN Computer Science, 2(3), 1–18. https://doi.org/10.1007/s42979-021-00557-0
  • Sharma, Y., Sharma, S., & Arora, A. (2022, June). Feature ranking using statistical techniques for Computer networks intrusion detection. Proceedings of the 2022 7th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India (pp. 761–765). IEEE.
  • Simion, C. P., Verdeș, C. A., Mironescu, A. A., & Anghel, F. G. (2023). Digitalization in energy production, distribution, and consumption: A systematic literature review. Energies, 16(4), 1960. https://doi.org/10.3390/en16041960
  • Singh, P., Borgohain, S. K., Sarkar, A. K., Kumar, J., Sharma, L. D., & El Kafhali, S. (2023). Feed-Forward deep neural network (FFDNN)-based deep features for static malware detection. International Journal of Intelligent Systems, 2023, 1–20. https://doi.org/10.1155/2023/9544481
  • Singh, N., Krishnaswamy, V., & Zhang, J. Z. (2022). Intellectual structure of cybersecurity research in enterprise information systems. Enterprise Information Systems, 17(6), 1–25. https://doi.org/10.1080/17517575.2022.2025545
  • Siripurapu, S., Darimireddy, N. K., Chehri, A., Sridhar, B., & Paramkusam, A. V. (2023). Technological advancements and elucidation gadgets for Healthcare applications: An exhaustive methodological review-part-I (AI, big data, block chain, open-source technologies, and cloud Computing). Electronics, 12(3), 750. https://doi.org/10.3390/electronics12030750
  • Soliman, M., Fatnassi, T., Elgammal, I., & Figueiredo, R. (2023). Exploring the Major trends and emerging Themes of Artificial intelligence in the scientific leading journals amidst the COVID-19 era. Big Data and Cognitive Computing, 7(1), 12. https://doi.org/10.3390/bdcc7010012
  • Stavropoulos, P., Papacharalampopoulos, A., & Sabatakakis, K. (2023). Robust and secure quality monitoring for welding through platform-as-a-service: A resistance and submerged arc welding study. Machines, 11(2), 298. https://doi.org/10.3390/machines11020298
  • Sufi, F. (2023). Algorithms in low-code-no-code for research applications: A practical review. Algorithms, 16(2), 108. https://doi.org/10.3390/a16020108
  • Sun, M., He, B., Li, R., Li, J., & Zhang, X. (2023). A survey: Network feature measurement based on machine learning. Applied Sciences, 13(4), 2551. https://doi.org/10.3390/app13042551
  • Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557–560.
  • Thakkar, A., & Lohiya, R. (2022). A survey on intrusion detection system: Feature selection, model, performance measures, application perspective, challenges, and future research directions. Artificial Intelligence Review, 55(1), 453–563. https://doi.org/10.1007/s10462-021-10037-9
  • Trim, P. R., & Lee, Y. I. (2022). Combining sociocultural intelligence with artificial intelligence to increase organizational cyber security provision through enhanced resilience. Big Data and Cognitive Computing, 6(4), 110. https://doi.org/10.3390/bdcc6040110
  • Wang, X., Cao, S., Zheng, K., Guo, X., & Shi, Y. (2023). Supervised character resemble substitution personality adversarial method. Electronics, 12(4), 869. https://doi.org/10.3390/electronics12040869
  • Wang, H., Meng, X., Tang, Q., Hao, Y., Luo, Y., & Li, J. (2023). Development and application of a standardized testset for an artificial intelligence medical device intended for the Computer-Aided Diagnosis of Diabetic Retinopathy. Journal of Healthcare Engineering, 2023.
  • Weippl, E. R., Holzinger, A., & Kieseberg, P. (2023). Special issue “selected papers from CD-MAKE 2020 and ARES 2020”. Machine Learning and Knowledge Extraction, 5(1), 173–174. https://doi.org/10.3390/make5010012
  • Werbińska-Wojciechowska, S., & Winiarska, K. (2023). Maintenance performance in the age of industry 4.0: A Bibliometric performance analysis and a systematic literature review. Sensors, 23(3), 1409. https://doi.org/10.3390/s23031409
  • Zhang, G., Luo, L., Zhang, L., & Liu, Z. (2023). Research progress of respiratory disease and idiopathic pulmonary fibrosis based on artificial intelligence. Diagnostics, 13(3), 357. https://doi.org/10.3390/diagnostics13030357
  • Zhang, J., Pan, L., Han, Q. L., Chen, C., Wen, S., & Xiang, Y. (2021). Deep learning based attack detection for cyber-physical system cybersecurity: A survey. IEEE/CAA Journal of AutomaticaSinica, 9(3), 377–391. https://doi.org/10.1109/JAS.2021.1004261