Application Review of Network Attack Detection Based on Deep Learning

Authors

  • Yixuan Liu
  • Jiaohang Yu

DOI:

https://doi.org/10.62051/9dg86559

Keywords:

Deep learning; Network attack detection; Neural network; Supervised learning.

Abstract

With the rapid development of the Internet, network attacks (NA) have become increasingly diverse and sophisticated. Traditional detection methods relying on rules systems and statistical analysis now face significant challenges, including strong dependency on feature engineering and limited generalization ability. The effectiveness of detection systems is not only limited, but the difficulty of addressing new threats is also increased. Deep learning has been recognized as a novel solution for NA detection due to its powerful nonlinear feature extraction capabilities and end-to-end learning paradigm. A concise overview of deep learning fundamentals is first provided. Subsequently, the paper proceeds with a systematic review of prevailing deep learning approaches for NA detection, followed by an analysis of their current limitations and challenges in NA. Finally, promising future research directions are proposed to address the aforementioned limitations and challenges.

Downloads

Download data is not yet available.

References

[1] Anderson J P. Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, 1980.

[2] Al-Qatf M, Lasheng Y, Al-Habib M, et al. Deep learning approach combining sparse autoencod-er with SVM for network intrusion detection. IEEE Access, 2018, 6: 52843-52856.

[3] Ding Hongwei, Chen Leiyang, Dong Liang, et al. Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Future Generation Computer Systems, 2022, 131: 240-254.

[4] Al-Yaseen W L, Othman Z A, Nazri M Z A. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Systems with Applications, 2017, 67: 296-303.

[5] Kravchik M, Shabtai A. Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA. IEEE Transactions on Dependable and Secure Computing, 2022, 19(4): 2179-2197.

[6] Chua L O, Roska T. The CNN paradigm. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1993, 40(3): 147-156.

[7] Otter D W, Medina J R, Kalita J K. A survey of the usages of deep learning for natural language processing. IEEE transactions on neural networks and learning systems, 2020, 32(2): 604-624.

[8] Kheddar H. Transformers and large language models for efficient intrusion detection systems: A comprehensive survey. arXiv preprint arXiv:2408.07583, 2024.

[9] Shen Bingbing, Ge Zhiqiang. Supervised nonlinear dynamic system for soft sensor application aided by variational auto - encoder. IEEE Transaction Instrumentation and Measurement, 2020, 69: 6132–6142.

[10] Gouda W, Tahir S, Alanazi S, et al. Unsupervised outlier detection in IOT using deep VAE. Sensors, 2022, 22(17): 6617.

[11] Sen M A. Attention-GAN for Anomaly Detection: A Cutting-Edge Approach to Cybersecurity Threat Management. arXiv preprint arXiv:2402.15945, 2024.

[12] Dutta A, Chatterjee S, Bhattacharya A, et al. Deep reinforcement learning for cyber system defense under dynamic adversarial uncertainties. arXiv preprint arXiv:2302.01595, 2023.

[13] Zhou J, Xu Z, Rush A M, et al. Automating botnet detection with graph neural networks. arXiv preprint arXiv:2003.06344, 2020.

[14] Mutalib N H A, Sabri A Q M, Wahab A W A, et al. Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review. Artificial Intelligence Review, 2024, 57(11): 297.

[15] Ding H, Sun Y, Huang N, et al. TMG - GAN: Generative adversarial networks-based imbalanced learning for network intrusion detection. IEEE Transactions on Information Forensics and Security, 2023, 19: 1156-1167.

[16] Apruzzese G, Andreolini M, Ferretti L, et al. Modeling realistic adversarial attacks against network intrusion detection systems. Digital Threats: Research and Practice (DTRAP), 2022, 3(3): 1-19.

[17] Avishka K P S, Gunasekara G K A, Maduwantha K K, et al. FedSec: Advanced Threat Detection System for Federated Learning Frameworks. 2023 5th International Conference on Advancements in Computing (ICAC). IEEE, 2023: 71-76.

[18] Fusco P, Rimoli GP, Ficco M. TinyIDS-an IoT intrusion detection system by tiny machine learning. Computational Science and ITS Applications-ICCSA 2024 Workshops, PT II, 2024, 14816: 71-82.

[19] Jiang Q, Chen C, Zhao H, et al. Understanding and constructing latent modality structures in multi - modal representation learning. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023: 7661-7671.

Downloads

Published

10-07-2025

How to Cite

Liu, Y. and Yu, J. (2025) “Application Review of Network Attack Detection Based on Deep Learning”, Transactions on Computer Science and Intelligent Systems Research, 9, pp. 191–196. doi:10.62051/9dg86559.