Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2022 Mar 4;22(5):2017. doi: 10.3390/s22052017

A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks

Chaitanya Gupta 1, Ishita Johri 2, Kathiravan Srinivasan 1, Yuh-Chung Hu 3, Saeed Mian Qaisar 4, Kuo-Yi Huang 5,*
Editors: Juan M Corchado, Bhisham Sharma, Deepika Koundal, Rabie A Ramadan
PMCID: PMC8915055  PMID: 35271163

Abstract

Today’s advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of information. Similarly, as mobile network topologies become more diverse and complicated, the incidence of security breaches has increased. It has hampered the uptake of smart mobile apps and services, which has been accentuated by the large variety of platforms that provide data, storage, computation, and application services to end-users. It becomes necessary in such scenarios to protect data and check its use and misuse. According to the research, an artificial intelligence-based security model should assure the secrecy, integrity, and authenticity of the system, its equipment, and the protocols that control the network, independent of its generation, in order to deal with such a complicated network. The open difficulties that mobile networks still face, such as unauthorised network scanning, fraud links, and so on, have been thoroughly examined. Numerous ML and DL techniques that can be utilised to create a secure environment, as well as various cyber security threats, are discussed. We address the necessity to develop new approaches to provide high security of electronic data in mobile networks because the possibilities for increasing mobile network security are inexhaustible.

Keywords: network, information security, cyber security, artificial intelligence, machine learning, deep learning, threats, cyber-attacks, vulnerabilities

1. Introduction

Electronic information is an asset for any organisation, and even in the case of an individual, their data can be quite significant to them, which they cannot afford to lose. Information security has become very important in today’s computing world, and it demands potential counters to ever-evolving threats. Hence, cyber security and risk management are vital for data-driven or information-dependent tasks.

Cyber security is a collection of procedures, actions of people, and technology that aid in the protection of electronic information resources. It is obvious that cyber attackers are outpacing defences, raising concerns about the security of sensitive digital assets [1]. The statistics on vulnerabilities and unauthorised access show most information-sharing devices, especially mobile networks, are at a high-security risk. The first stage in evaluating a system’s security or assessing risks is to identify resources. It is very important to identify a comprehensive approach that is best suited to the risky situation. This aids in the adoption of the most cutting-edge method for predicting information security threats and their subsequent mitigation. The best-suited model may also depend on the attack scenarios and target of attack. Hence, proper research is required to deal with electronic information security. As the number of cyber-attacks, particularly on mobile networks, increases, so does the performance of our systems to combat them, as discussed in the following sections.

Figure 1 depicts the general taxonomy of artificial intelligence techniques. There exists an extensive horizon of trans-disciplinary association between cybersecurity and artificial intelligence. Technologies such as deep learning could be deployed in devising sophisticated models for intrusion detection, malware classification, and cyber threat sensing in a mobile network. AI models require specialised cybersecurity and protection solutions to minimise vulnerabilities and ensure better privacy of information, as well as to enable a safe federated learning environment [2]. The development of artificial intelligence has led to the emergence of many other fields such as ML, NLP, computer vision, etc. [3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25]. Deep learning, one of the most prominent subsets of AI, is making significant progress in solving challenges related to information security threats [26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51]. The models built using these technologies work within IT risk management frameworks to create a secure ecosystem of networks.

Figure 1.

Figure 1

General taxonomy–artificial intelligence techniques.

Mobile ransomware, crypto mining, fraudulent apps, and banking Trojans are among the most common dangers to mobile networks. Mobile applications have surpassed desktop programmes as the most popular method of accessing personalised services such as sending and receiving emails, banking services, online shopping, and automated device controls. Hackers have taken advantage of the patch systems to infect mobile apps, making them ideal targets for cybercriminals. Existing security solutions appear to be insufficient for the impending mobile technology, which has increased transmission rates on networks. With improvements in AI technology, complex models are making breakthroughs in the security of various critical applications, many of which are based on mobile networks. However, this does not mean that the capabilities of threats exploiting our system have been reduced. The extensive advancements in the mobile network domain help the new generation of networks to be much faster and more secure than the previous versions. Still, the challenge to security from identified and unidentified risks indicates the need for an extension of ongoing risk management systems. As a result, while having a profusion of frameworks for securing an organisation’s resources from cyberthreats, the option for cyber security decision makers remains mostly challenging [3].

We propose to offer a comprehensive analysis of the main approaches that can be employed for the security of electronic data based on observations made during the systematic revision and assessment of AI-enabled technique solutions. This article gives a complete review of how and why AI technology has been employed for electronic information security, as well as list of the mobile network security domains where AI-enabled techniques have been used. A thorough examination of existing ML and DL models was conducted in order to gain a clear understanding of how this technology contributes to vulnerability detection and mitigation. We can also figure out where these models would be vulnerable to a cyber-attack. Because most of us now spend a significant amount of time on our mobile devices, the data we generate or use is subject to a variety of cyber-attacks, which will be discussed in more detail in subsequent sections. It has also been addressed in relation to a number of popular datasets that help in the creation of secure architecture for networks. The subject is better understood with the help of many figures and tables. Finally, this paper encourages discussion of potential research topics and open issues related to information security in mobile networks. Appendix A contains a list of acronyms used in this review, as well as their definitions.

1.1. Contribution of This Survey

This paper bridges the gap between artificial intelligence and electronic information security by offering a comprehensive assessment of machine learning and deep learning approaches and techniques for electronic information security in mobile networks. Table 1 presents the comparison of this work with the previous reviews. The key contributions of this study are summarised as follows:

  • We provide a comprehensive study on the various machine learning and deep learning models used for electronic information security in mobile networks. A brief explanation of several machine learning and deep learning methodologies is included.

  • A concise review of cyberattacks as well as an application-oriented analysis of their datasets is given.

  • We highlight the current open challenges and future research possibilities in the fields of mobile networks, electronic data security, and cyber threats for aspiring researchers and enthusiasts to investigate.

Table 1.

Comparison with Previous Reviews. (✓: Discussed, ×: Not Discussed).

Reference Year Number of Articles Time Span One-Sentence Summary ML DL
[16] 2017 260 1986–2017 Intelligent network traffic control systems analysis and future study directions.
[23] 2019 145 2011–2019 UAV communications for 5G networks and upcoming future networks. × ×
[24] 2019 574 1986–2019 Deep learning techniques in mobile and wireless networks.
[29] 2019 174 1958–2019 Survey on DL methods for cyber security. ×
[33] 2020 65 2004–2020 An examination of AI-enabled phishing attack detection techniques.
[36] 2020 139 1990–2019 Description of several ML approaches used in vehicular networks for communication, networking, and security. ×
[39] 2020 262 2009–2020 ML techniques used for cyber security. ×
[40] 2020 668 1988–2020 ML techniques description and comparison for cyber security. ×
[41] 2020 88 1958–2020 Report on neural networks usage for intrusion detection systems.
[42] 2020 142 1993–2020 Network intrusion detection system.
[43] 2020 175 2002–2020 Survey on moving networks. × ×
[44] 2020 181 1991–2019 Cyber security data science using machine learning. ×
[50] 2021 189 1989–2021 DL for challenged networks. ×
[51] 2021 138 1999–2020 ML approaches for mobile network and malicious behaviour detection. ×
Our Review 2022 177 1998–2022 This review offers a widespread investigation on the various machine learning and deep learning models for electronic information security in mobile networks.

1.2. Survey Methodology

We used the “preferred reporting items for systematic reviews and meta-analyses (PRISMA)” methodology to select the papers for this study.

1.2.1. Search Strategy and Literature Sources

From January 1998 to January 2022, articles on developing metaheuristic algorithms were searched on Google Scholar, ScienceDirect, IEEE Xplore, ACM Digital Library, IET Digital Library, Wiley Online Library, Springer Nature, and Springer databases. Using search terms such as “Electronic Information Security” or “Cyber Security models” or “Mobile Network Security” or “Cyber-attack” or “Artificial Intelligence” or “Machine Learning” or “Deep Learning Security model”, this analysis found roughly 1800 plus articles.

1.2.2. Inclusion Criteria

This study includes articles about electronic information security in mobile networks that were authored and published in the English language between January 1998 and January 2022. This review contains some recent findings that help in taking research work one step forward.

1.2.3. Elimination Criteria

This review excluded reports, case studies, editorials, publications, analyses, conference proceedings, doctoral dissertations, and theses that were published in languages other than English or before January 1998.

1.2.4. Results

Initially, duplicates were removed from 1880 publications, and 780 were chosen for a full text analysis after assessing their abstracts. The investigation includes journal and conference articles. After reading the full text of these publications, 603 are eliminated because they were using duplicate methods or had previously been published. In the end, 177 publications were examined in this study. Using a PRISMA diagram, Figure 2 depicts the process of selecting papers for this study.

Figure 2.

Figure 2

Articles selection process: Machine learning and deep learning models for electronic information security in mobile networks–PRISMA flow chart.

1.3. Structure of this Survey

Figure 3 depicts the layout of this survey paper. Section 1 defines the terms “Electronic information Security” and “Mobile networks” and explains how this field has grown in recent years. It also discusses existing technologies that are already being used for the same purpose, as well as how we performed our study to proceed. Section 2 provides an in-depth look at a variety of AI-enabled methodologies, with a focus on machine learning and deep learning models. Several cyber-attacks and their defence mechanisms are detailed in Section 3. It also provides an overview of several well-known datasets that can aid in the development of a robust cyber-attack defence mechanism or model for mobile networks. Section 4 discusses open information security challenges. In Section 5, opportunities and various future research directions are mentioned. Finally, Section 6 brings the paper to a close. At the end of the paper, several reference materials used in its preparation are listed.

Figure 3.

Figure 3

Structural flow of this review.

2. Machine Learning and Deep Learning Models Used in Electronic Information Security Applications

2.1. The Evolution and Overview of Machine Learning and Deep Learning Models

AI is an area of computer science that deals with intelligent systems. It is a fast-growing field, and it has been developing rapidly in the last few years. The evolution of AI is an ongoing process, and we can expect to see more developments in the future. AI is being developed to help humans in many ways, from decision-supporting to helping with the most mundane of tasks. The early days of AI saw the use of expert systems, which were programmed to provide advice and decision support to human users [1]. These expert systems were developed using rule-based programming languages such as Prolog, LISP, etc. The next stage was natural language processing (NLP), which helped machines understand human speech better by converting words into computer-readable text [52]. This made it possible for computers to understand written or spoken language as well as humans do.

In this section, we will explore the history of AI and the future of computing power. We will also see what developments are taking place in the field of security models for mobile networks, what human decisions are being supported by AI, and what these systems can do for us today.

2.2. Machine Learning Techniques

Machine learning is a data-driven approach to developing artificial intelligence. It is a subset of AI, and it has many strengths and uses statistical techniques for predictive purposes [53]. It was developed in the 1940s, but it wasn’t until recently that we have been able to use it in our everyday lives. ML algorithms generally use the following two types of learning methods: supervised and unsupervised learning. Unsupervised learning requires no feedback, whereas supervised learning relies on human feedback [52]. ML has many strengths, but the most important ones are its methodology and reinforcement learning. The ML methodology involves training an algorithm with a set of data so it can identify patterns in new data sets [54]. Reinforcement learning is a class of ML where the intelligent system learns by trial and error by being rewarded or punished for its actions. In the following section, we will be reviewing the machine learning models for electronic information security.

2.2.1. Artificial Neural Network

Artificial neural networks (ANNs) are based on the biological neural networks seen in the human brain and are analogous to them. They are built up of artificial neurons that are interconnected and interact with one another [42]. ANNs are made up of two visible layers (an input layer and an output layer) as well as one or more hidden layers. The input layer is where information comes into the network from the outside world, and the output layer is where it leaves as a result of processing. In between these two layers, there are hidden layers that consist of nodes that receive input from nodes in the previous layers and send signals to nodes in the next layers. These hidden layers help the neural network process information in parallel computations [1].

The first artificial neural network was created in 1943 by Warren McCulloch and Walter Pitts. They were trying to model the human brain and how it learns through feedback. ANNs have the ability to learn by adjusting weights for each neuron based on feedback. The hidden layers have many parameters, called weights, which can be adjusted during training to increase or decrease how much influence a particular neuron has over its neighbours. They also use backpropagation, which adjusts weights based on error values, to make sure that they minimise errors.

Dimitrios Damopoulos et al. [55] used exploratory methods to forecast and identify probable unauthorised activities and undesirable occurrences in user behaviour in terms of phone calls, text messages, web browsing history, and multimodal data. Bayesian networks, RBF, KNN, and Random Forest were all tested as supervised machine learning algorithms. RBF is a feed-forward network with a single hidden layer that is commonly used to solve approximation problems. The final goal was to construct frequent-usage mobile user behaviour profiles with the goal of informing users when their behaviour deviates from the norm.

Before they achieved their intended target, Saied et al. [56] employed ANN to detect and mitigate predictable and unpredictable DDoS attacks (TCP, UDP, and ICMP protocols). The DDoS attack protocols, TCP, UDP, and ICMP, were chosen based on their prevalence among DDoS attackers.

2.2.2. Naïve Bayes

Naive Bayes fall under the category of probabilistic classifiers, which are used to classify data based on the data’s probability distribution and characteristics. The NB model implies that the features are independent, which means that the likelihood of a feature being present is unaffected by the presence or absence of other features. This assumption simplifies the computation by ignoring conditional probabilities. Naive Bayes assumes that the conditional distributions for each class are independent given the model parameters, or equivalently, that the joint distribution of all classes can be factored as a product of independent factors [53]. This means that Naive Bayes ignores any dependencies between the features when estimating the probabilities of a label in a classification problem and any correlations between features when estimating regression coefficients. The naive assumption simplifies the computations because it avoids having to explicitly store or update covariance matrices in memory.

In 2014, F. A. Narudin, A. Feizollah, presented a study on identifying mobile malware using several machine learning algorithms [6]. Two datasets are used in the following evaluation: public (MalGenome) and private (self-collected). The Bayes network had a 99.97 percent true-positive rate (TPR) on the MalGenome dataset, compared to a TPR of only 93.03 percent for the multi-layer perceptron.

In terms of telephone conversations, SMS, and web browsing history, the Bayesian networks provided highly promising results, with an average TPR and accuracy of 99.06 percent and 98.76 percent in the worst circumstance, respectively, as proposed by Damopoulos et al. [55].

2.2.3. Decision Tree

Decision trees are a popular data analysis technique for classification and regression problems. A decision tree is a recursive tree structure that helps to classify or predict values of a target variable. The recursive tree structure is built by repeatedly splitting the data set into the following two parts: one with the members that satisfy the current test, and one with those who do not satisfy it [1]. The root node is the starting point for the tree, and it has branches that lead to other nodes, which are called terminal nodes. These terminal nodes are the leaves of the tree, which represent different observations or outcomes of the target variables [57].

Decision trees work by checking the data against an entropy measure to determine the best split for each node. The entropy is calculated by counting the number of bits needed to encode the input and then dividing it by two. The best split is found by calculating information gain, which is calculated as the following: gain = how much entropy we removed.

Decision trees work by calculating entropy and information gain for each split point in order to decide which variable should be used to divide the data. The entropy calculation is used to measure how evenly distributed our data is; meanwhile, information gain calculates how much information will be gained by using one. The advantage of decision trees is that they provide an easy way to visualise how data is classified into groups by splitting it at different points in order to find patterns in the data.

Wu et al. [58] proposed a DDoS-detection model based on decision-tree techniques (C4.5). It also included a new attacker traceback based on GRA traffic pattern matching (grey relational analysis). With separate attacks, the false positive ratio was about 1.2–2.4 percent and the false negative ratio was about 2–10 percent while performing the experiment to detect DDoS attacks.

2.2.4. K-Nearest Neighbour

The K-nearest neighbour is a supervised learning algorithm that is used to assign objects into one of the K-clusters. The algorithm assigns each object to the cluster with the closest mean, and it is one of the simplest algorithms for clustering. It works by finding the K-nearest neighbours to a given point and then classifying the point as belonging to whichever of those k points is most similar. The KNN algorithm classifies data points into different clusters by comparing their features to the features of the other data points in their cluster. The number of clusters can be determined by setting a threshold on the similarity values between two points [12]. This threshold is often set at 0.5, meaning that two points are put into different clusters if they are more than half as similar as another point in their cluster. The number of neighbours to use for classification can be determined by setting a parameter called k, which represents how many neighbours to compare with each point before making a decision about its cluster membership [1].

The K-nearest neighbour algorithm has the following number of advantages:

  • It does not require any assumptions about the shape or distribution of input data.

  • It does not require any pre-processing or transformation of input data before assigning them to clusters, making it computationally effective.

  • It does not require any parameter tuning and can be used for both dense and sparse sets of data.

KNN is a lazy learner in the sense that it doesn’t update its model after it makes predictions as compared to K-means, which is an eager learner. It just remembers the last prediction made and then predicts the same thing again when asked to make a new prediction.

In the study published by Narudin et al. [6] on detecting mobile malware effectively using different ML techniques, the KNN classifier achieved the highest accuracy of 84.57%. Moreover, the greatest precision, recall, and f-measure value were produced by KNN.

2.2.5. K-Means Clustering

Clustering is a powerful technique for exploring data because it groups together items that are similar to one another. K-means clustering is an iterative machine learning algorithm that is used for finding clusters in data [42]. It is simple to implement, has a low computational cost, and can be applied to both continuous and discrete data. It starts with the random selection of k values. These values are called centroids, and they are used to create clusters. K-means clustering has the disadvantage of requiring the specification of an arbitrary number of clusters, which can be difficult to determine in advance. The higher the k value, the more evenly we split our data points across clusters. The lower the k value, the more tightly packed our data points will be in each cluster. The algorithm then assigns each data point to the closest cluster by calculating the distance between each point and every centroid. The next round of clustering is performed by assigning new centroids to the clusters that were created in the previous round.

In the experiments carried out by Do et al. [59], three alternative initiation methods were used to test the K-means classifier. K-means is a cluster classifier that works best when clusters are evenly distributed, which was not the case with DNS tunnelling. Where only a small portion of the traffic data was malicious, K-means still provided quite interesting results, but was unable to detect outliers for the given dataset.

2.2.6. Random Forest

Random forest is a type of ensemble learning technique for classification and regression. RF is a supervised machine learning algorithm used to build classification or regression models by combining many decision trees, each of which is built using only part of the data [6]. The technique was first proposed by Leo Breiman in 2001 as a way to reduce variance in predictions from decision trees because it gives equal weight to each tree’s prediction and does not over-rely on any one particular tree that may have been overfit to the training data used to create it. Each decision tree in the forest is independent of the others, so different trees may give different classifications for a particular input. The final classification or regression model is based on a majority vote of each individual decision tree [53].

The Random Forest algorithm is often used for classification and regression problems, but can also be applied to clustering and other tasks. It has been shown to outperform both individual decision trees and other ensemble methods in many cases, while being significantly easier to fit.

Belavagi et al. [60] attempted to compare the performance of supervised machine learning classifiers such as SVM, Random Forest, logistic regression, and Naive Bayes for building intrusion detection systems. For the dataset (NSL-KDD) and parameters evaluated, the Random Forest classifier outperformed other classifiers as it possessed an accuracy rate of 99 percent based upon the precision, recall, F1-Score, etc.

Random Forest produced the best results in Damopoulos et al. [55]’s performance evaluation on telephone conversations, SMSs, and web browsing histories, with its average TPR and accuracy standing above 99.8% and 98.9%, respectively, in all circumstances.

2.2.7. Support Vector Machine

An SVM is a supervised learning model that is used to classify data into different classes. SVM is a classification algorithm that was created by Vladimir Vapnik and Alexey Chervonenkis in 1963. It can prove to be useful when creating a classifier for any given data set. An SVM works by mapping the data points onto a higher-dimensional space, called the feature space, and then separating them using a hyperplane. Support vector points are data points that are located on the hyperplane’s edge.

SVMs are classified into two classes based on the kernel function, which can be either linear or nonlinear, and the detection type, which can be either one-class or multi-class [12]. The hyperplane is chosen so that it divides the classes as equally as possible while maximising the distance between them. SVMs model the decision boundary in the space of possible inputs by a hyperplane that optimises some measure of “margin”. The hyperplane is then parameterized with a kernel function that defines the distance from the hyperplane to points in its vicinity.

In mobile networks, Do et al. [59] proposed using OCSVM with an RBF kernel to identify DNS tunnelling. Four clients were used to originate and gather both benign and malicious DNS traffic in a testbed. Experiments were conducted, with the results demonstrating OCSVM poly kernel, a viable technique for detecting DNS tunnelling with the highest F-score measurement.

2.2.8. Ensemble Models

A recent trend in machine learning is ensemble models. These models are created by combining multiple classifiers to form a more accurate prediction. Ensemble models have the advantage of being able to be trained on a variety of datasets. This allows them to be more accurate than individual classifiers since they have more information to work with. Ensemble models also have the ability to handle new data better than single classifiers because they are not as specialised as single classifiers are. Ensemble models are created by training many different classifiers on the same dataset, and then combining their predictions. This is performed because each individual classifier has its own strengths and weaknesses [42]. For example, some may be better at differentiating between classes than others, or they may be better at predicting something other than the final classification (such as the probability of an intrusion). By combining their predictions, ensemble models can take advantage of each individual classifier’s strengths while also mitigating their weaknesses.

The ensemble model has been found to be more accurate than any individual model in some cases. There are the following two types of ensemble models: bagging and boosting. Boosting is the most popular type of ensemble model because it overcomes many weaknesses that were found in bagging models. The most common type of ensemble model is called an “ensemble method,” which is composed of decision trees or boosted decision trees.

Based on the concept of stacking, Rajagopal et al. [61] suggested an ensemble approach for effective network intrusion detection. The stacking method was used to improve the accuracy and F measure of malware detection on mobile devices. A mixture of techniques, including random forest, logistic regression, K-closest neighbour, and support vector machine, gave better predictions on a real-time dataset than on an emulated dataset. Among the 7 known attacks detected in the UGR’16 dataset, the suggested ensemble model was the most effective in detecting the occurrence of the blacklist attack type. Such an attack detection potential, when demonstrated by intrusion detection models, can be effective in addressing new threats such as DDOS, DOS, and scan attacks.

2.2.9. Machine Learning Models for Electronic Information Security

Network security is an ever-changing field with new threats popping up every day. Machine learning models provide the opportunity to stay up-to-date with the latest technological advancements in this field, while providing effective protection against these new threats as well as the old ones that have been around for years. In this section, we discussed some of the other machine learning models that can also be used in cybersecurity, such as intrusion detection and anomaly detection. Intrusion detection is a process where an intrusion is detected and prevented before it can cause any damage to the system. Anomaly detection, on the other hand, focuses on identifying anomalies in a system. These techniques help identify malicious attacks by looking for unusual patterns or behaviours. Biologically inspired methods are commonly used in other machine learning algorithms, but research on the artificial defence system is limited.

Software defined network-based (SDN-based) detection systems built on machine learning and/or implemented in the cloud have been proposed to guard networks from DDoS attacks, which convert targeted virtual computers (as a replication of users’ PCs) to safe virtual machines. [39]. Another growing subject in machine learning is semi-supervised learning, which is defined as a combination of supervised and unsupervised learning [62]. Reinforcement learning models for network security have been developed to help with the detection and prevention of cyber-attacks. These models are based on the idea that a system should be able to learn from its past experiences and then use this knowledge to make decisions in the future. It can be trained to detect certain patterns or behaviours that are indicators of an attack. The learning model will then send out alerts when it finds something suspicious, so that humans can take over if necessary and investigate further.

Figure 4 illustrates the nomenclature of current machine learning models for electronic information security. Table 2 presents the summary of works on machine learning techniques for electronic information security.

Figure 4.

Figure 4

Nomenclature of current machine learning models for electronic information security.

Table 2.

A summary of works on machine learning techniques for electronic information security.

Reference Security-Category Machine Learning Approaches Used Key Contribution Limitations
[63] Network Attack Patterns C4.5 Decision Tree; Bayesian Network; Naive-Bayes; Decision Table
  • Leveraging ML approach for defining security rules on the SDN controller.

  • Viability of ML approach in SDN.

  • Effects of minor security threats on SDN security.

The approach generates variable results for different datasets. A higher variance in data would lead to higher chances of false prediction.
[64] Network Anomaly Detection GA; SVM
  • Select more suitable packet fields through GA using the primary feature selection method.

  • Using the enhanced SVM technique alongside one-class SVM novelty detection ability, enables a high soft margin SVM performance.

A more realistic profiling method would be required to apply the framework in a real TCP/IP traffic environment.
[65] Traffic Classification Laplacian SVM
  • Real-time and adaptive classification of a traffic flow into a QoS category without needing to identify the precise application that originates the traffic flow.

Labelling to be performed explicitly for the datasets in semi-supervised algorithms as unsupervised ML-based algorithms cannot be directly applied in SDN.
[66] Real-time Intrusion Detection PSO; SVM
  • To construct an IDS, an algorithm akin to the PSO-based selection approach is introduced.

Requires improvement in feature selection algorithm on search strategy and evaluation criterion.
[67] Jamming Attacks ANN; SVM; LR; KNN; DT; NB
  • Detection, localization, and avoiding power jamming attacks in optical networks using various ML based solutions.

  • Lowering the probability of successful jamming of lightpaths using resource reallocation scheme that utilises the statistical information of attack detection accuracy.

The studied localization is limited to the jammed channel.
[68] Malware Detection DT; NB; RF
  • Providing a central solution for enterprise security which works on the firewall level in the network.

  • Modern and enhanced machine learning and data mining are used to create a malware detection module.

The proposed solution is not viable for home users, being very processor heavy for a general-purpose machine.
[69] Network Anomalies (DoS Flooding) AdaboostM1; RF; MLP
  • ML related methods are used to detect and classify network intrusions utilising a MIB-based approach.

  • To classify and detect the DoS and brute force attacks use various classifiers.

  • Using ML algorithms for SNMP-MIB data is a very successful strategy for detecting DoS and brute force attacks.

None of the classifiers managed to detect the brute force attack in the TCP dataset.F-Measure results performance is less effective for AdaboostM1 classifiers in the TCP-SYN and UDP flood attacks compared to other attacks.
[70] Webshell Detection K-means; MLP; NB; DT; SVM; KNN
  • For IoT server security experimentation, a new dataset was compiled that included 1551 malicious PHP webshells and 2593 regular PHP scripts.

  • For data pre-processing, term frequency inverse document frequency (TFIDF), opcode, and combined Opcode-TFIDF feature extraction approaches were explored.

  • The dataset is analysed using feature clustering technique based on principal component analysis (PCA).

  • Features important for webshell detection are evaluated.

Tests carried out on machine learning models for webshell detection on PHP scripts only. Higher accuracy results require IoT servers with reliable computing power.
[71] Jamming-Based Denial-of-Service and Eavesdropping Attacks MLP; SVM; KNN; DT; Thresh
  • Proposal of a unique approach to protect wireless communication in a WiNoC from external and internal attackers using persistent jamming-based denial-of-service (DoS) attacks and eavesdropping (ED).

  • Securing communication over wireless channels with a lightweight and low-latency data scrambling mechanism.

In the presence of an internal DoS attack, the performance is not as adequate and only slightly better than a wired NoC.
[72] Poisoning Attacks (Unreliable Model Updates) Stochastic Gradient Descent (SGD) Algorithm
  • Resolving issues of unreliable model updates by introducing reputation as a reliable measure to choose trustworthy workers for reliable federated learning.

  • An effective reputation computation technique is designed using a multi-weight subjective logic model.

Each local worker model trained needs to send regular updates to the central server at regular periods. Insufficient reliable method to monitor worker metrics.

2.3. Deep Learning Models

Typically, in terms of performance, the deep learning models have surpassed the generic machine learning approaches. These DL models have a deep structure and possess automatic learning capabilities. Moreover, they generate an output without any external intervention. Unlike traditional machine learning approaches, deep learning models use layers of multiple artificial neurons to work efficiently at a level that can learn extremely complex tasks without being explicitly programmed [73].

In the past, neural networks have been used for tasks such as facial recognition or voice recognition by analysing images or sound waves, respectively. In the past 2 years, however, these neural networks have started to take over many other roles in our society, and society will never be quite the same again. In this section we present the deep learning models for electronic information security especially in mobile networks. Table 3 presents a summary of works on deep learning models for electronic information security.

Table 3.

A summary of works on deep learning models for electronic information security.

Reference Security-Category Deep Learning Models Used Key Contribution Limitations
[95] Malware Detection Deep Convolutional Neural Network (DCNN)
  • Hand-engineered malware features have no requirement.

  • To make the process easier, the network is trained end-to-end to understand suitable properties and conduct classifications.

  • After the model has been trained, it may be effectively and executed on a GPU with efficiency, permitting a large number of files to be scanned rapidly.

  • For dynamic and static malware detection on several platforms, it is impractical.

  • Malware detection is incompatible with the design and creation of data augmentation methods.

[96] Intrusion Detection System (IDS) Artificial Neural Network (ANN), Stacked Auto Encoder (SAE)
  • Select the most important features only to reduce their dimensionality.

  • It is suitable for resource-constrained devices.

  • The reduced input features are sufficient for classification tasks.

  • Limited to lightweight IDS.

  • The issue of a wireless network is difficult to solve.

[97] Network Traffic Identification Stacked autoencoder and one-dimensional convolution neural network (CNN)
  • Both of the tasks such as traffic characterization and application identification are dealt with.

  • Automatic feature extraction saves time and money by eliminating the need for experts to detect and extract handmade elements from traffic, resulting in higher accuracy for traffic classification.

  • Low efficiency for multi-channel (e.g., differentiating between various types of Skype traffic such as that of chats, video and voice calls) classification and accuracy in classifying Tor’s traffic, etc.

[98] Spam Email Detection Bidirectional Encoder Representations from Transformers (BERT)
  • Effectiveness of word embedding because of hyper-parameter fine-tuning.

  • 98.67% and 98.66% F1 score indicating persistence and robustness of the model.

  • Smaller input sequence taken.

  • Not valid for text in other languages such as Arabic, etc.

[78] Intrusion Detection (5G) RBM; RNN
  • It can manage traffic fluctuation.

  • Optimising the computational resources at any point in time along with refining the performance and behaviour of analysis and detection procedures is the primary goal.

  • The architecture may adapt and adjust by itself the anomaly detection system depending on the amount of network flows gathered in real-time from 5G subscribers’ user equipment, reducing resource consumption and maximising efficiency.

  • Because of the abundance of network traffic handled by a RAN, accuracy suffers.

  • Model is not trained for a real-time environment.

[99] False Data Injection RBM
  • The detection scheme is unaffected by the number of attacked data, SVE detection thresholds, and certain degrees of noise in the surroundings.

  • Model can achieve high accuracy for detection in presence of the operation faults occurring now and then.

  • More realistic FDI attack behaviours are necessary in the model, along with an analysis of the smallest number of sensing units.

[100] Keystroke Verification RNN
  • A high scalability in terms of user count as well as good precision avoiding false positive errors

  • Takes more time to be fully trained.

  • The classification algorithm selection was affected under the assumption by authors that keystroke dynamics data was sequence-based.

[101] Border Gateway Protocol Anomaly Detection RNN
  • Solve the problem of bursts and noise in dynamic Internet traffic that occur regularly.

  • It learns and grasps traffic patterns using historical features in a sliding time span.

  • The classifier performs well.

  • It’s vulnerable to overfitting, and using the dropout algorithm to prevent it is challenging.

  • This method is affected by various random weight initialization.

[102] DGA CNN RNN
  • Amenable for real-time detection.

  • There were 8 DGA that the model was not able to detect.

[103] Insider Threat DFNN RNN CNN GNN
  • DFNN: To detect anomalies one can employ the concept of utilising a deep autoencoder.

  • RNN: Capturing temporal information of the users’ activity sequences.

  • CNN: Great accuracy and precision if the data of a users’ activity can be represented in the form of images.

  • GNN: Organisation information networks are fairly powerful to model the graph data.

  • Data that is extremely unbalanced.

  • In attacks, there is a lot of temporal information.

  • Fusion of heterogeneous data.

  • There aren’t any practical evaluation metrics.

  • Interpretability.

  • Subtle and Adaptive Threats.

  • Fine-grained Detection.

2.3.1. Recurrent Neural Networks

Recurrent neural networks (RNNs) are a type of neural network that is made up of many layers. They are designed to be able to process sequential information. The recurrent connection in the network allows it to store information in its memory cell and use it when processing new data [74]. They also have parameter sharing, which makes it easier for the network to learn and memorise things but harder to train at the same time [53]. These models also use gradient descent as a method for learning and memory cells as a way of storing information.

Information security in mobile networks is one of the applications of RNN. It is capable of intrusion detection, network analysis, and even modelling the time series profile of LTE networks. Ailing Xiao et al. [75] developed a quality of experience (QoE) prediction engine based on a recurrent neural network (RNN) that was able to account for the following three descriptive parameters: video clarity, rebuffering, and rate adjustment in two phases, as well as the impact of several cognitive factors in a mobile network. The model accounts for quality mobile network experience and data management.

2.3.2. Deep Autoencoder

The deep autoencoder algorithm is an unsupervised learning algorithm that learns to encode input data into a lower-dimensional space [74]. Encoding and decoding are the two stages of the deep autoencoder’s architecture. The encoding stage is where the input data is transformed into a lower-dimensional space by applying a series of linear transformations to the input data and then passing it through an activation function [27]. The decoding stage takes the compressed representation and reconstructs it back to its original form, with each layer in the network performing a different transformation on the input data (e.g., adding more features). They have a number of parameters called “hidden units” that are learned from previous training data.

This type of neural network relies on artificial intelligence and has been found to be both computationally and memory-efficient in its interpretation of data from sensory input such as images, video, or sound waves. They come with a large variety of applications, including natural language processing, image recognition, identification, and compression. Nasir Rahim et al. [76] have come up with a mechanism that ensures a user’s privacy when information in the form of images is being communicated through mobile networks. Images are represented as hash codes, which are compressed representations of deep convolutional features generated by an auto-encoder in the Cloud.

Since the mobile phone does not support ultra-wideband and the positioning cost is expensive, ultra-wideband positioning is difficult to achieve a wide range of inside coverage. Due to the sheer uncertainty of the mobile phone’s initial orientation and the accuracy of the inertial sensor, inertial navigation is not ideal. Yanru Zhong et al. [77] developed a deep neural network using stacked auto encoders and performed pre-training to obtain a more accurate Wi-Fi indoor positioning model.

2.3.3. Long Short-Term Memory

The LSTM architecture is an element of recurrent neural networks that was created to solve the problems that conventional feedforward networks faced. As they let computers interpret phrases with numerous layers of meaning, LSTMs are frequently used in natural language processing. Long short-term memory (LSTM) is capable of remembering values for much longer than the typical artificial neuron. The LSTM architecture was designed to address the vanishing gradient problem in traditional neural networks, which occurs when each connection within a network carries an independent weight that does not change over time [74].

The LSTM can learn “context” by storing information about what happened before and after every sequence it observes. This makes it possible for the LSTM to make sense of data that has been split up into separate, unrelated pieces. Forget gates are one of its main components. These gates control how much information is stored in the network, and they are usually set to one for simple tasks. In order to train an LSTM, it needs a lot more data than a typical neural network as well as more computational power. In addition, the training process can take significantly longer than for other types of deep learning networks.

Many applications of LSTM have been successfully implemented, including wearable activity recognition, text categorization, IDS classifier, and so on, which deal directly with information security. It can also be used to detect anomalies in a 5G network [78]. Qingshan Wang et al. [79] proposed a supervised deep learning system to convert opportunistic forwarding to fixed path forwarding in data package communication. LSTM (Long Short-Term Memory) effectively improves packet delivery ratio while drastically lowering network overhead in this case. It can be used to investigate the data’s hidden characteristics and rework data forwarding techniques.

2.3.4. Deep Neural Network

Deep neural networks, unlike shallow neural networks, feature multiple hidden layers between the input and output layers, resulting in a huge number of hidden layers [73]. The number of these hidden layers determines the network’s depth. The input layer takes in data from outside sources and processes it through the rest of the network. The middle layers are called “hidden” because they cannot be seen by looking at the network itself. The last layer is called “output” because it’s where all of the processed data comes out after being processed by all of these layers. Deep artificial neural networks, in contrast to shallow artificial neural networks, have been demonstrated to be capable of learning features at multiple levels of abstraction [27].

Guo, Liang, et al. [80] published a study that minimises the likelihood of data leakage in mobile wireless networks. It illustrates that there is no need to transport data to a cloud server because it trains deep learning models locally, requiring just the transmission of knowledge (model weight or model gradient) rather than data, lowering the risk of data privacy exposure while marginally impairing performance. There have been multiple implementations of modified deep neural networks as well, which can be used to achieve better performance. As a result, deep neural networks in mobile network applications efficiently handle the basic objective of information security.

2.3.5. Deep Belief Network

Deep belief networks are a type of neural network that can be used for unsupervised learning. They are typically composed of multiple layers, and each layer is made up of nodes [27]. The hidden layers in between these two layers contain weights that represent the probability distribution over all possible states at each point in time. These weights can be determined by training or by an unsupervised algorithm called “greedy layer-wise pre-training.” This type of neural network is often trained in a greedy fashion, which means it will start by randomly assigning weights to the nodes and then use unsupervised learning to correct any errors in the weights. The input nodes are connected to each layer in the network. The output layer is then connected to the next layer in the network. The process of unsupervised pre-training is when a deep belief network is trained with input data but without the labels or desired output [53].

In mobile networks, Deep Belief Networks can be particularly useful for information management and transmission. Greeshma Arya et al. [81] showed that data transfer in 5G WSN communication may be performed efficiently. The shortest path for packet forwarding has resulted in increased network lifetime and energy efficiency.

2.3.6. Deep Convolutional Neural Network

The deep convolutional neural network consists of one input layer, three convolution and subsampling pairs, three fully linked layers, and a single sigmoid unit in the output layer. The model has proven outstanding accuracy, precision, and F-score for a lot of tasks, along with natural language processing, object recognition, and image classification. The deep convolutional neural network (DCNN) is usually recommended for in-depth malware data processing in mobile networks [82]. Mobile networks can consist of a variety of information in the form of text, images, and videos, all of which can be protected using a DCNN model trained according to the possible vulnerabilities of the network.

Deep CNN’s incredible learning capacity is because of the utilisation of many features extraction stages that can learn representations from information automatically. Deep CNNs are basically feedforwarding neural networks with BP algorithms implemented to modify the network’s parameters (weights and biases) to minimise the cost of the function’s value. One or more convolutional layers (typically followed by means of a subsampling layer) precede one or more fully related layers within the network [83]. However, many deep CNNs have troubles with overcrowding and require loads of processing time.

2.3.7. Deep Generative Models

Deep generative models based on variational inference allow system behaviours to be learned and attacks to be identified as they occur on their own. This model can handle natural data in its raw form and automatically learn and find its representations, enhancing system knowledge discovery while eliminating the requirement for considerable human engineering and domain expertise [84]. In these models, alternative ways of approximating the input data distribution are learned and then sampled from it to generate previously unknown but credible results [85]. Although deep generative models cannot estimate the density function, they are preferable when it comes to modelling and controlling high-dimensional probability distributions as their training and sampling allow for a better understanding of the underlying complexity. It can be used for inverse reinforcement learning and can be included in reinforcement learning, particularly with generative adversarial networks. The idea is to transform a known and simple distribution (for example, a univariate Gaussian) using a deep neural network that acts as a generator. The features of this model make it feasible for use in the network security domain.

5G networks that are currently in trend have also implemented deep generative models as in the study presented by Daegyeom Kim et al. [86]. It includes a 5G traffic modelling approach as well as a strategy for determining the required spectrum for privatised 5G networks. By learning from real traffic traces obtained from a large mobile network operator, the generative model is able to produce realistic traffic.

2.3.8. Deep Boltzmann Machine

A deep Boltzmann machine (DBM) is a type of artificial neural network that can be put to use in approximate probability distributions. Boltzmann machines (BM) and restricted Boltzmann machines (RBM) are computational models of neural networks. The BM is a generative model, which means that it generates data samples from a statistical distribution. The RBM is a discriminative model, which means that it can be used to classify data samples. The Boltzmann distribution is a probability distribution that describes the relative likelihood of particles being in one state or another [24]. The Boltzmann machine contains two layers the visible layer and the hidden layer. The visible and hidden layers can have any number of nodes, but each node has an associated weight vector. All nodes are fully connected to every other node in both layers. The connections between nodes in different layers are restricted to within the same layer, so there are no connections between visible and hidden nodes.

DBM has a variety of applications in various domains. Based on a joint deep Boltzmann machine (jDBM) model, Mohammad Rafiqul Alam et al. [87] offer an audio–visual person recognition technique. Tests were conducted on the complex MOBIO database, which contains audio-visual data captured by mobile phones. The results were quite good, demonstrating that the model is resistant to noise and missing data.

2.3.9. Deep Reinforcement Learning

Both reinforcement learning and deep learning are combined in deep reinforcement learning. Reinforcement learning addresses the problem of a computing system being trained to make judgments through trial-and-error. Furthermore, deep reinforcement learning is a deep learning-based system that allows users to make decisions based on unstructured input data without manually engineering the subspace. The model blends high-dimensional problem-solving techniques with reinforcement learning to enable high-dimensional interaction. The fact that an actor is rewarded or penalised based on their actions is intrinsic to this type of machine learning. Actions that lead to the desired result are rewarded (reinforced). A model is trained through trial and error, making this technology suited for dynamic surroundings that vary considerably.

DRL techniques can be used to cope with growing troubles in communications and networking. The problems embody dynamic community obtaining the right of access to, information rate manipulation, wi-fi caching, facts offloading, community protection, and connectivity protection, which may be all vital to next-generation networks, including 5G and beyond [73].

2.3.10. Extreme Learning Machine

The extreme learning machine (ELM) is a single-hidden layer feedforward neural network training algorithm that produces results much quicker than traditional approaches and generates excellent performance [88]. Guang-Bin and Qin-Yu proposed the extreme learning machine (ELM) with the purpose of training single-hidden layer feedforward networks [89]. As ELM learns without the need for an iterative process, it converges much faster than usual algorithms.

Theoretical investigation revealed that with random parameters, ELM is more likely to obtain a global optimal solution than traditional networks with all the parameters to be trained [90]. ELM is quite popular nowadays because of its variety of applications such as robotics [91], IoT-based models [92,93,94], control systems [93], etc., as well as its high accuracy, cross-domain adaptation, and low time consumption (training time mostly).

Speaking of information security in mobile networks, ELM can be used for localization and positioning systems, data management, analysing mobile signal quality, and many other applications. The model may be used as an efficient and more accurate predictive method for predicting the location of mobile users based on location fingerprint data due to its exceptionally fast processing speed [89].

2.3.11. Deep Learning Models for Electronic Information Security

Although complete automation of detection and analysis is a desirable goal, deep learning’s performance in cybersecurity should be evaluated with sensitivity [53]. Repudiation actions, denial of service, information tampering, and leakage are all concerns that electronic information security models for mobile networks face today. Many studies have shown that deep learning technology can assist us in developing the finest security models. DBNs or RBMs or deep autoencoders coupled with classification layers, restricted Boltzmann machines (RBMs), recursive neural networks (RNNs), and several other hybrid DL models have been successfully deployed and have shown promising results in terms of electronic information security, as described in detail by Daniel S. Berman et al. [29]. Improvements in existing DL algorithms will drive research to progress the state of DL in the domain of information security systems for mobile networks. Figure 5 portrays the nomenclature of current deep learning models for electronic information security. Figure 6 depicts the archetypal workflow of machine learning and deep learning models for electronic information security in mobile networks. Figure 7 presents the taxonomy of AI-enabled electronic information security models for mobile networks.

Figure 5.

Figure 5

Nomenclature of current deep learning models for electronic information security.

Figure 6.

Figure 6

Archetypal workflow of machine learning and deep learning models for electronic information security in mobile networks.

Figure 7.

Figure 7

Taxonomy of AI-enabled electronic information security models for mobile networks.

3. Electronic Information Security, Cyber-Attacks and Their Defences

3.1. Cyber-Attacks

Any offensive activity that targets electronic information systems, their networks, and infrastructure is referred to as a “cyber-attack”. Its main purpose is to steal, modify, or destroy information. Attack vectors that leverage a lack of readiness and (system as well as human) preparedness to access confidential data or compromise systems are common in the current cyber-attack scenario. Human shortcomings are also used to engineer attack vectors. A cyber-attack can be seen as a situation in which a system or network flaw is exploited by a variety of vulnerabilities. The process of familiarising yourself with new technologies, security trends, and threat intelligence can be a daunting task. Although the target may or may not be aware of all types of cyber-attacks, it might have a mechanism implemented to deal with a few of them. The cause of a cyber-attack may be an inherent risk or a residual risk depending on its risk analysis. Figure 8 depicts the nomenclature of cyber-attacks used in this review. Figure 9 presents the general taxonomy of cyber-threats.

Figure 8.

Figure 8

Nomenclature of cyber-attacks used in this review.

Figure 9.

Figure 9

General taxonomy of cyber-threats.

3.2. Cyber-Attack Defences

Cyber-attack defences form the basis of cybersecurity and risk management systems. Any information security model is mainly characterised by the way it handles cyber-attack defences. The ever-growing cyberspace is a platform for anyone who shares a network ecosystem through various electronic devices. However, this cyberspace also includes attackers and unauthorised users who have bad intentions. For this reason, it is necessary to have a precautionary approach when dealing with cyber-attack defences. A proper defence mechanism identifies the attack or risk, alerts the system, and functions accordingly to mitigate it. Cyber-attack defence is a concept that can be explained as a set of defined procedures and activities that can be precautionary or come into play during or after a cyber-attack occurs. It checks for signs of a cyber-attack that is either pending, current, or successful. A retrospective analysis can assist us in determining the best cyber-attack defensive method.

3.3. Cyber-Attack Datasets

The variety of cyber-attacks has exploded in recent years. This rise in structure and complexity needs more advanced defensive and detecting measures. Traditional ways of identifying cyber-attacks are inefficient, especially in the context of the rising demand for security risks. With the evolution of new technologies such as AI and ML, the datasets that can be used for building complex security systems have also evolved. Some of the old datasets that were quite efficient back then have been improvised now. Moreover, many new datasets have been framed to cope with the existing and upcoming vulnerabilities. Table 4 presents a list of various cyber-attack datasets.

Table 4.

List of various cyber-attack datasets.

Reference Year Dataset Used Dataset Size Format Details about the Dataset/Brief Description
[104] 2016 CAIDA DDoS 2007 and MIT DARPA dataset 5.3 GB pcap (tcpdump) format
  • -

    An hour of anonymized traffic records from a DDoS attack on 4 August 2007 is included in this dataset.

  • -

    This form of denial-of-service attack tries to prevent users from accessing the server by using all of the computational resources and bandwidth on the network.

[105] 2015 Botnet [Zeus (Snort), Zeus (NETRESEC),
Zeus-2 (NIMS), Conficker
(CAIDA) and ISOT-Uvic]
14 GB packets packet
  • -

    It is a network-based dataset. It basically works on diverse networks and intercepts emulated traffic (Normal and attack traffic).

  • -

    The data set is well labelled but not balanced.

[106] 2009 NSL-KDD 4 GB of compressed (approx.)/150k points tcpdump data
  • -

    The train set does not contain any redundant records nor any duplicate records.

  • -

    A limited number of datasets are taken into consideration for training and testing.

[107] 2011 ISOT 11 GB packets packet
  • -

    The ISOT dataset was compiled from two different datasets comprising malicious traffic from the Honeynet project’s French chapter, which involved the Storm and Waledac botnets, respectively.

[54] 2016 UNSW-NB-15 100 GB CSV files
  • -

    The Australian Centre for Cyber Security’s (ACCS) Cyber Range Lab used an IXIA PerfectStorm programme to construct a combination of realistic modern regular activities and synthetic contemporary attack behaviours from network data.

[108] 2017 Unified Host and
Network
150 GB flows
(compressed)
bi. flows, logs
  • -

    A subset of network and computer (host) events makes up the Unified Host and Network Dataset, events were collected over a 90-day period from the Los Alamos National Laboratory enterprise network.

[109] 2011 Yahoo Password Frequency Corpus 130.64 kB (compressed) txt files
  • -

    The dataset contains sanitised password frequency lists from Yahoo, which were obtained in May 2011.

[110] 2014 500K HTTP Headers 75 MB CSV files
  • -

    Crawled the top 500K sites (as ranked by Alexa).

[111] 2014 The Drebin Dataset 6 MB (approx.) txt log, CSV and XML files
  • -

    The goal of the dataset is to promote Android malware research and allow for comparisons of different detection methods.

  • -

    There are 5560 applications in the dataset, representing 179 separate malware families. Between August 2010 and October 2012, the samples were collected.

[112] 2008 Common Crawl 320 TiB WARC and ARC format
  • -

    Since 2008, the Common Crawl corpus has accumulated petabytes of data.

  • -

    Raw web page data, extracted metadata, and text extractions are all included, composed of over 50 billion web pages.

4. Open Problems-Electronic Information Security in Mobile Networks

Recent years have seen a significant increase in the complexity and challenges of managing electronic data. The complexity stems from IS’s ubiquitous and multifunctional character, which attempts to safeguard and rely on information assurance to protect an organisation’s valuable assets while also advancing commercial interactions by creating trust, business alliances, and collaboration platforms [113]. We have identified the following three crucial management issues that need to be addressed in order to fully resolve this issue: (1) compromising system security by addressing risks after the whole system is established; (2) security and information systems are designed in parallel; (3) inadequate thinking is used to shape solutions [114]. Figure 10 illustrates the open problems associated with electronic information security for mobile networks.

Figure 10.

Figure 10

Electronic information security in mobile networks–open problems.

After analysing various electronic information security systems, it can be concluded that the link between the actor and the system needs to be minimised. Here, an actor is referred to as an internal or external entity that interacts with the system. One may also misuse electronic information for political and socio-economic reasons. Such cases can be commonly seen in the medical and political fields because of the personal benefits and greed of an individual. Although transparency in the working environment and user interaction with the system may increase efficiency, it is equally important to ensure a reliable, free from tampering, and fraud-resistant security model. A good information security architecture must look for user mistakes, technical errors, and drawbacks that can act as soft spots for attackers and hackers.

In the real world, we must deal with the challenges of using machine learning models to address a problem in the most efficient manner possible. Models that operate on a single device frequently require data that is too massive for the device to manage. The algorithms might not be able to generalise or scale well in accordance with the complexity of the infrastructure that they run upon. Reducing complexity by designing generalised algorithms that are scalable and don’t have to work with all the data on a single device can help us make more informed decisions with less data, which is good as we will not have to use slower and more resource-intensive methods of training.

The majority of incidents that happened in the last 2–3 years were related to unauthorised network scanning, probing, vulnerable services, viruses, malicious code, and website defacements. Every year, the number of incidents increases, and so does the number of new vulnerabilities. However, they certainly share a certain pattern by which they sophisticatedly attack the system, leaving the user clueless about it. Many of these attacks do not even require new technology to be built to deal with them. Instead, changes in the existing technology can also help in that situation. However, the time available to deal with a threat is so limited that we are sometimes powerless to intervene.

Any electronic gadget with which we interact nowadays has an interface, which is essentially a software package that contains multiple other software packages. It is imperative to update them regularly. These update distributions may endanger your system. If your company isn’t patching and, as a result, isn’t meeting compliance criteria, regulatory bodies may levy monetary penalties. Patch management should be performed as part of a well-organised, cost-effective, and security-focused procedure [115].

The learning process for deep neural networks often runs into difficulty when the data is unstructured and high-dimensional. Deep learning models require a pre-defined sequence of representations, requiring the data to be fed into the model in an order that can be predicted by the neural network. The pre-defined sequence of representations also limits the complexity of the tasks to be learned. These two limitations make it difficult for deep learning to perform well on structured data and other high-dimensional tasks. Zero-day attack complexities can be another set of risks that exist in the environment when it comes to electronic information systems.

One of the most well-known and difficult problems with machine learning models is their vulnerability to adversary attacks. These attacks are designed to fool classifiers into misclassifying an input sample as belonging to one class when it actually belongs to another. Current adversarial AI research focuses on techniques in which tiny modifications to ML inputs can fool an ML classifier, causing it to respond incorrectly [116]. Such results prove that these complex attacks are becoming stronger than their defensive countermeasures. These attacks have been observed in many different fields and have been studied extensively, but the security violations they present and their specificity still need more investigation. Recently, some researchers have been focusing on how adversarial scenarios can be handled by AI models. They created a way to build models that are capable of detecting adversarial activities without either leaking information on what they are building or making predictions in an unsafe manner. A scenario-based evaluation of electronic information security models can be the best solution in such situations, but it still poses challenges for the future.

Wireless technology is one of the most successful and booming technologies in the present-day market. Since radio waves can enter through dividers, there is an extraordinary possibility of unapproved admittance to the network and information. Due to the broadcasting nature of wireless signals, anyone can sniff the organisation for its significant accreditations. On the off chance that the organisation isn’t as expected, assailants will obtain adequate information to send off an assault. As a result, the threat is all around us, posing a significant challenge for cyberspace security.

5. Future Directions—Electronic Information Security in Mobile Networks

In today’s world, businesses rely on internal computer systems and the Internet to conduct business, and they can’t afford to have their operations disrupted [117]. Not only computer systems but other devices such as smartphones, etc., are significantly affecting network security. Several data analysis activities are performed on remote clouds that are hosted by third parties due to the limited computational capabilities of discrete wireless nodes. Much of the research omits the key step of eliminating privacy-sensitive features from acquired data in lieu of uploading the data to remote clouds.

Privacy has become increasingly important due to the rapid development of technology and the internet. In order for this to not be an issue anymore, there needs to be a greater awareness of the importance of privacy and security. Privacy-preserving encryption schemes can be incorporated as they provide confidentiality protection for messages exchanged between pairs of users using cryptographic keys. Furthermore, privacy- and anonymity-preserving databases and biometric technologies can be embedded together with such models to provide a secure system data storage. This clearly points out the threat to privacy in the domain of big data analytics. Still, a balance needs to be struck between privacy and the quality of data analysis and computational models such as ML algorithms. In terms of security, network topology is equally important. Hence, scalability issues in an interdependent security model can be eliminated in the future to reduce inefficiencies in the model. Economic and privacy concerns lead to under-reporting of security incidents in the security ecosystem [118]. A better technique to cope with networking threats that arise unexpectedly is an area that requires significant improvement. Furthermore, if current models are improvised in certain scenarios, at least crucial information can be kept abstract. In terms of cyber security strategies, AI and ML are the fields that will be utilized in the near future. In such cases, a scenario-based evaluation of electronic information security models may be the best answer, although it still faces future challenges.

Hardware-assisted countermeasures are a new way to protect networks from cyber threats, attacks, and vulnerabilities as they provide an additional layer of protection that is not available with traditional software solutions. These hardware-assisted countermeasures can be classified into the following three categories: memory-centric, data-centric, and device-centric hardware-assisted countermeasures. The most common type of hardware-assisted countermeasure is those that deal with edge computing, or cloud computing, which refers to having data processing performed at the source of the data rather than transferring it over a network connection for processing elsewhere. Wireless networks and cloud storage are also the most accessible and susceptible, making them exposed to a variety of threats such as traffic eavesdropping and capturing, evil twin attacks, brute force attacks, misconfigurations, and so on. Hence, the need for a conceptual approach to trust management can be incorporated into online applications.

There is much ongoing research in quantum computing for machine learning. It is a dynamic field because it has the potential to solve many complex problems and optimise the process of data analysis, but it is also a complex topic because it has many layers and connections to other disciplines such as physics, mathematics, computer science, and so on. The main challenge in quantum computing is the fact that it requires a lot of resources and time for calculations, so it’s not yet ready for commercial use. In the future, quantum computing is expected to be able to solve problems that cannot be solved on classical machines. These problems include optimization problems and solving dynamic systems with many variables. Figure 11 depicts the future research directions associated with electronic information security for mobile networks.

Figure 11.

Figure 11

Future research directions—electronic information security in mobile networks.

6. Conclusions

Early detection and elimination of cyber threats have become of the utmost importance in the contemporary world, be it individuals or mega-organisations dealing with electronic information and data. Adversaries no longer just rely on conventional attack strategies and are evolving over time, which brings about a need for us to develop and evolve the pre-existing defence action plans [119,120,121,122,123,124,125,126,127]. Through this paper, we tend to bring together the various approaches put forward in recent studies through AI-enabled techniques such as ML and DL to enhance a sense of security in mobile networks [128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178]. A brief run-through of the popular machine learning algorithms is provided based on the reviewed articles, followed by a survey of proposals tackling numerous security threat categories. The advancements of both cyber-attacks and defence strategies have been organised in this paper; relevant articles have been evaluated to find the impact of different twists introduced in generic ML/DL algorithms on the vulnerabilities faced by electronic information systems and mobile networks. By providing a brief overview of the most recognised datasets that are utilised to train and test the models, a quality breakdown of the cyber-attack datasets has been carried out. Finally, to encourage future researchers and enthusiasts, synopses of current open challenges and potential study areas have been laid out.

Appendix A

Table A1.

List of acronyms used in this review along with their definition.

Acronym Definition
5G 5th Generation
AE Autoencoder
AI Artificial Intelligence
ANN Artificial Neural Network
BLSTM-RNN Bidirectional LSTM RNN
BM Boltzmann Machine
BP Back-Propagation
CNN Convolutional Neural Network
CPPS
DBM
Cyber-Physical Power System
Deep Boltzmann machine
DBN Deep Belief Network
DCNN Deep Convolutional Neural Network
DDoS Distributed Denial of Service
DFNN Deep Feedforward Neural Network
DL Deep Learning
DOS Denial of Service
DRL Deep Reinforcement Learning
DT Decision Tree
ELM Extreme Learning Machine
GA Genetic Algorithm
GNN Graph Neural Network
GRA Grey Relational Analysis
GRU Gated Recurrent Unit
ICMP Internet Control Message Protocol
IEEE Institute of Electrical and Electronics Engineers
IET Institution of Engineering and Technology
IDS Intrusion Detection System
IoT Internet of Things
IP Internet Protocol
IS Information Security
IT Information Technology
KNN K-nearest Neighbour
LR Logistic Regression
LSTM Long Short-Term Memory
LTE Long Term Evolution
MIB Management Information Base
ML Machine Learning
MLP Multilayer Perceptron
NB Naive Bayesian
NIDS Network Intrusion Detection System
NLP Natural Language Processing
NN Neural Networks
NoC Network-on-Chip
OCSVM One Class Support Vector Machine
PCA Principal Component Analysis
PHP Hypertext Pre-processor
PLS Partial Least Squares
PRISMA Preferred Reporting Items for Systematic Reviews and Meta-Analyses
PSO Particle Swarm Optimization
RBF Radial Basis Function
RBM Restricted Boltzmann Machine
RF Reinforcement Learning
RL Reinforcement Learning
RNN Recurrent Neural Network
SDN Software Defined Networking
SE Social Engineering
SGD Stochastic Gradient Descent
SLFN Single Hidden Layer Feedforward Neural Network
SMS Short Message Service
SNMP Simple Network Management Protocol
SQL Structured Query Language
SVM Support Vector Machines
TAN Transaction Authentication Numbers
TCP Transmission Control Protocol
TFIDF Term Frequency Inverse Document Frequency
TPR True Positive Rate
UAV Unmanned Aerial Vehicle
UDP User Datagram Protocol
WiNoC Wireless Network-on-Chip
WSN Wireless Sensor Network

Author Contributions

Conceptualization, K.S.; methodology, K.S.; software, C.G., I.J. and K.S.; validation, Y.-C.H., S.M.Q. and K.-Y.H.; formal analysis, C.G. and I.J.; investigation, C.G., I.J. and K.S.; resources, Y.-C.H. and K.-Y.H.; data curation, C.G. and I.J.; writing—original draft preparation, C.G., I.J. and K.S.; writing—review and editing, C.G., I.J., K.S., Y.-C.H., S.M.Q. and K.-Y.H.; visualization, C.G., I.J. and K.S.; supervision, K.-Y.H.; project administration, Y.-C.H.; funding acquisition, K.-Y.H. All authors have read and agreed to the published version of the manuscript.

Funding

The authors thank the Ministry of Science and Technology, Taiwan, for financially supporting this research under Contract MOST 110-2221-E-005-067-, and 110-2634-F-005-006-.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Zeadally S., Adi E., Baig Z., Khan I.A. Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access. 2020;8:23817–23837. doi: 10.1109/ACCESS.2020.2968045. [DOI] [Google Scholar]
  • 2.Kong L.-J. An improved information-security risk assessment algorithm for a hybrid model. Int. J. Adv. Comput. Technol. 2013;5:2. [Google Scholar]
  • 3.Suo H., Liu Z., Wan J., Zhou K. Security and privacy in mobile cloud computing; Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC); Sardinia, Italy. 1–5 July 2013; pp. 655–659. [DOI] [Google Scholar]
  • 4.Chamola V., Jolfaei A., Chanana V., Parashari P., Hassija V. Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 2021;176:99–118. doi: 10.1016/j.comcom.2021.05.019. [DOI] [Google Scholar]
  • 5.Gan X.-S., Duanmu J.-S., Wang J.-F., Cong W. Anomaly intrusion detection based on PLS feature extraction and core vector machine. Knowl.-Based Syst. 2013;40:1–6. doi: 10.1016/j.knosys.2012.09.004. [DOI] [Google Scholar]
  • 6.Narudin F.A., Feizollah A., Anuar N.B., Gani A. Evaluation of machine learning classifiers for mobile malware detection. Soft Comput. 2014;20:343–357. doi: 10.1007/s00500-014-1511-6. [DOI] [Google Scholar]
  • 7.Zhang B.-Y., Yin J.-P., Wang S.-L., Yan X.-A. Research on virus detection technique based on ensemble neural network and SVM. Neurocomputing. 2014;137:24–33. doi: 10.1016/j.neucom.2013.04.055. [DOI] [Google Scholar]
  • 8.Yang K., Zhang K., Ren J., Shen X. Security and privacy in mobile crowdsourcing networks: Challenges and opportunities. IEEE Commun. Mag. 2015;53:75–81. doi: 10.1109/MCOM.2015.7180511. [DOI] [Google Scholar]
  • 9.Deng S., Yue N., Fu X., Zhou A. Security risk assessment of cyber physical power system based on rough set and gene expression programming. IEEE/CAA J. Autom. Sin. 2015;2:431–439. doi: 10.1109/jas.2015.7296538. [DOI] [Google Scholar]
  • 10.Liu X., Lu R., Ma J., Chen L., Qin B. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification. IEEE J. Biomed. Health Inform. 2015;20:655–668. doi: 10.1109/JBHI.2015.2407157. [DOI] [PubMed] [Google Scholar]
  • 11.Liyanage M., Abro A.B., Ylianttila M., Gurtov A. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security. IEEE Secur. Priv. 2016;14:34–44. doi: 10.1109/MSP.2016.82. [DOI] [Google Scholar]
  • 12.Aburomman A., Reaz M.B.I. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 2016;38:360–372. doi: 10.1016/j.asoc.2015.10.011. [DOI] [Google Scholar]
  • 13.Chen J., Ma H., Zhao D., Liu L. Correlated Differential Privacy Protection for Mobile Crowdsensing. IEEE Trans. Big Data. 2021;7:784–795. doi: 10.1109/TBDATA.2017.2777862. [DOI] [Google Scholar]
  • 14.Jiang C., Zhang H., Ren Y., Han Z., Chen K.-C., Hanzo L. Machine Learning Paradigms for Next-Generation Wireless Networks. IEEE Wirel. Commun. 2016;24:98–105. doi: 10.1109/MWC.2016.1500356WC. [DOI] [Google Scholar]
  • 15.Wang W., Zhu M., Zeng X., Ye X., Sheng Y. Malware traffic classification using convolutional neural network for representation learning; Proceedings of the International Conference on Information Networking (ICOIN); Da Nang, Vietnam. 11–13 January 2017; pp. 712–717. [DOI] [Google Scholar]
  • 16.Fadlullah Z.M., Tang F., Mao B., Kato N., Akashi O., Inoue T., Mizutani K. State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems. IEEE Commun. Surv. Tutor. 2017;19:2432–2455. doi: 10.1109/COMST.2017.2707140. [DOI] [Google Scholar]
  • 17.Shah S.K., Tariq Z., Lee J., Lee Y. Event-Driven Deep Learning for Edge Intelligence (EDL-EI) Sensors. 2021;21:6023. doi: 10.3390/s21186023. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 18.Xiong J., Ma R., Chen L., Tian Y., Lin L., Jin B. Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. Wirel. Commun. Mob. Comput. 2018;2018:1–12. doi: 10.1155/2018/8959635. [DOI] [Google Scholar]
  • 19.Zhang Q., Mozaffari M., Saad W., Bennis M., Debbah M. Machine Learning for Predictive On-Demand Deployment of Uavs for Wireless Communications; Proceedings of the IEEE Global Communications Conference (GLOBECOM); Abu Dhabi, United Arab Emirates. 10–12 December 2018; pp. 1–6. [DOI] [Google Scholar]
  • 20.Lin X., Li J., Wu J., Liang H., Yang W. Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach. IEEE Trans. Ind. Inform. 2019;15:6367–6378. doi: 10.1109/TII.2019.2917307. [DOI] [Google Scholar]
  • 21.Yasin A., Fatima R., Liu L., Yasin A., Wang J. Contemplating social engineering studies and attack scenarios: A review study. Secur. Priv. 2019;2:e73. doi: 10.1002/spy2.73. [DOI] [Google Scholar]
  • 22.Chen Z., He Q., Liu L., Lan D., Chung H.-M., Mao Z. An Artificial Intelligence Perspective on Mobile Edge Computing; Proceedings of the IEEE International Conference on Smart Internet of Things (SmartIoT); Tianjin, China. 9–11 August 2019; pp. 100–106. [DOI] [Google Scholar]
  • 23.Li B., Fei Z., Zhang Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2018;6:2241–2263. doi: 10.1109/JIOT.2018.2887086. [DOI] [Google Scholar]
  • 24.Zhang C., Patras P., Haddadi H. Deep Learning in Mobile and Wireless Networking: A Survey. IEEE Commun. Surv. Tutor. 2019;21:2224–2287. doi: 10.1109/COMST.2019.2904897. [DOI] [Google Scholar]
  • 25.Arivudainambi D., KA V.K., Visu P. Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance. Comput. Commun. 2019;147:50–57. doi: 10.1016/j.comcom.2019.08.003. [DOI] [Google Scholar]
  • 26.Serey J., Quezada L., Alfaro M., Fuertes G., Vargas M., Ternero R., Sabattin J., Duran C., Gutierrez S. Artificial Intelligence Methodologies for Data Management. Symmetry. 2021;13:2040. doi: 10.3390/sym13112040. [DOI] [Google Scholar]
  • 27.Zhang Y., Kantarci B. Invited Paper: AI-Based Security Design of Mobile Crowdsensing Systems: Review, Challenges and Case Studies; Proceedings of the 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE); San Francisco, CA, USA. 4–9 April 2019; pp. 17–1709. [DOI] [Google Scholar]
  • 28.Kulin M., Kazaz T., De Poorter E., Moerman I. A Survey on Machine Learning-Based Performance Improvement of Wireless Networks: PHY, MAC and Network Layer. Electronics. 2021;10:318. doi: 10.3390/electronics10030318. [DOI] [Google Scholar]
  • 29.Berman D.S., Buczak A.L., Chavis J.S., Corbett C.L. A Survey of Deep Learning Methods for Cyber Security. Information. 2019;10:122. doi: 10.3390/info10040122. [DOI] [Google Scholar]
  • 30.Ali M., Hu Y.-F., Luong D.K., Oguntala G., Li J.-P., Abdo K. Adversarial Attacks on AI based Intrusion Detection System for Heterogeneous Wireless Communications Networks; Proceedings of the 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC); San Antonio, TX, USA. 11–15 October 2020; pp. 1–6. [DOI] [Google Scholar]
  • 31.Qiu J., Du L., Chen Y., Tian Z., Du X., Guizani M. Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task. IEEE Veh. Technol. Mag. 2020;15:95–100. doi: 10.1109/MVT.2020.3002487. [DOI] [Google Scholar]
  • 32.Kuzlu M., Fair C., Guler O. Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things. 2021;1:1–14. doi: 10.1007/s43926-020-00001-4. [DOI] [Google Scholar]
  • 33.Basit A., Zafar M., Liu X., Javed A.R., Jalil Z., Kifayat K. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 2020;76:139–154. doi: 10.1007/s11235-020-00733-2. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 34.Song H., Bai J., Yi Y., Wu J., Liu L. Artificial Intelligence Enabled Internet of Things: Network Architecture and Spectrum Access. IEEE Comput. Intell. Mag. 2020;15:44–51. doi: 10.1109/MCI.2019.2954643. [DOI] [Google Scholar]
  • 35.Pan Q., Wu J., Li J., Yang W., Guan Z. Blockchain and AI Empowered Trust-Information-Centric Network for Beyond 5G. IEEE Netw. 2020;34:38–45. doi: 10.1109/MNET.021.1900608. [DOI] [Google Scholar]
  • 36.Tang F., Kawamoto Y., Kato N., Liu J. Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches. Proc. IEEE. 2019;108:292–307. doi: 10.1109/JPROC.2019.2954595. [DOI] [Google Scholar]
  • 37.Radanliev P., De Roure D., Walton R., Van Kleek M., Montalvo R.M., Maddox L., Santos O., Burnap P., Anthi E. Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge. SN Appl. Sci. 2020;2:1–8. doi: 10.1007/s42452-020-03559-4. [DOI] [Google Scholar]
  • 38.Tom E., Keane P.A., Blazes M., Pasquale L.R., Chiang M.F., Lee A.Y., Lee C.S., Force A.A.A.I.T. Protecting Data Privacy in the Age of AI-Enabled Ophthalmology. Transl. Vis. Sci. Technol. 2020;9:36. doi: 10.1167/tvst.9.2.36. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 39.Dasgupta D., Akhtar Z., Sen S. Machine learning in cybersecurity: A comprehensive survey. J. Déf. Model. Simul. Appl. Methodol. Technol. 2020;19:57–106. doi: 10.1177/1548512920951275. [DOI] [Google Scholar]
  • 40.Shaukat K., Luo S., Varadharajan V., Hameed I.A., Xu M. A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access. 2020;8:222310–222354. doi: 10.1109/ACCESS.2020.3041951. [DOI] [Google Scholar]
  • 41.Drewek-Ossowicka A., Pietrołaj M., Rumiński J. A survey of neural networks usage for intrusion detection systems. J. Ambient Intell. Humaniz. Comput. 2020;12:497–514. doi: 10.1007/s12652-020-02014-x. [DOI] [Google Scholar]
  • 42.Ahmad Z., Khan A.S., Shiang C.W., Abdullah J., Ahmad F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2020;32:e4150. doi: 10.1002/ett.4150. [DOI] [Google Scholar]
  • 43.Jaffry S., Hussain R., Gui X., Hasan S.F. A Comprehensive Survey on Moving Networks. IEEE Commun. Surv. Tutor. 2020;23:110–136. doi: 10.1109/COMST.2020.3029005. [DOI] [Google Scholar]
  • 44.Sarker I.H., Kayes A.S.M., Badsha S., Alqahtani H., Watters P., Ng A. Cybersecurity data science: An overview from machine learning perspective. J. Big Data. 2020;7:1–29. doi: 10.1186/s40537-020-00318-5. [DOI] [Google Scholar]
  • 45.Zhang Z., Zhou S. A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things. Comput. Netw. 2021;201:108553. doi: 10.1016/j.comnet.2021.108553. [DOI] [Google Scholar]
  • 46.Trnka M., Abdelfattah A.S., Shrestha A., Coffey M., Cerny T. Systematic Review of Authentication and Authorization Advancements for the Internet of Things. Sensors. 2022;22:1361. doi: 10.3390/s22041361. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 47.Yan X., Ma M. A lightweight and secure handover authentication scheme for 5G network using neighbour base stations. J. Netw. Comput. Appl. 2021;193:103204. doi: 10.1016/j.jnca.2021.103204. [DOI] [Google Scholar]
  • 48.Xiong J., Zhao M., Alam Bhuiyan Z., Chen L., Tian Y. An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT. IEEE Trans. Ind. Inform. 2019;17:922–933. doi: 10.1109/TII.2019.2957130. [DOI] [Google Scholar]
  • 49.Otoum S., Al Ridhawi I., Mouftah H.T. Preventing and Controlling Epidemics Through Blockchain-Assisted AI-Enabled Networks. IEEE Netw. 2021;35:34–41. doi: 10.1109/MNET.011.2000628. [DOI] [Google Scholar]
  • 50.Bochie K., Gilbert M.S., Gantert L., Barbosa M.S., Medeiros D.S., Campista M.E.M. A survey on deep learning for challenged networks: Applications and trends. J. Netw. Comput. Appl. 2021;194:103213. doi: 10.1016/j.jnca.2021.103213. [DOI] [Google Scholar]
  • 51.Rabbani M., Wang Y., Khoshkangini R., Jelodar H., Zhao R., Ahmadi S.B.B., Ayobi S. A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies. Entropy. 2021;23:529. doi: 10.3390/e23050529. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 52.Yavanoglu O., Aydos M. A review on cyber security datasets for machine learning algorithms; Proceedings of the 2017 IEEE International Conference on Big Data (Big Data); Boston, MA, USA. 11–14 December 2017; pp. 2186–2193. [DOI] [Google Scholar]
  • 53.Apruzzese G., Colajanni M., Ferretti L., Guido A., Marchetti M. On the Effectiveness of Machine and Deep Learning for Cyber Security; Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon); Tallinn, Estonia. 29 May–1 June 2018; [DOI] [Google Scholar]
  • 54.Bhamare D., Salman T., Samaka M., Erbad A., Jain R. Feasibility of Supervised Machine Learning for Cloud Security; Proceedings of the 2016 International Conference on Information Science and Security (ICISS); Pattaya, Thailand. 19 December 2016; pp. 1–5. [DOI] [Google Scholar]
  • 55.Damopoulos D., Menesidou S.A., Kambourakis G., Papadaki M., Clarke N., Gritzalis S. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Secur. Commun. Netw. 2011;5:3–14. doi: 10.1002/sec.341. [DOI] [Google Scholar]
  • 56.Saied A., Overill R.E., Radzik T. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing. 2016;172:385–393. doi: 10.1016/j.neucom.2015.04.101. [DOI] [Google Scholar]
  • 57.Sinclair C., Pierce L., Matzner S. An application of machine learning to network intrusion detection; Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99); Phoenix, AZ, USA. 6–10 December 1999; [DOI] [Google Scholar]
  • 58.Wu Y.C., Tseng H.R., Yang W., Jan R.H. DDoS detection and traceback with decision tree and grey relational analysis. Int. J. Ad Hoc Ubiquitous Comput. 2011;7:121. doi: 10.1504/IJAHUC.2011.038998. [DOI] [Google Scholar]
  • 59.Do V.T., Engelstad P., Feng B., van Do T. Detection of DNS Tunneling in Mobile Networks Using Machine Learning; Proceedings of the International Conference on Information Science and Applications; Wuhan, China. 8–9 July 2017; pp. 221–230. [DOI] [Google Scholar]
  • 60.Belavagi M.C., Muniyal B. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection. Procedia Comput. Sci. 2016;89:117–123. doi: 10.1016/j.procs.2016.06.016. [DOI] [Google Scholar]
  • 61.Rajagopal S., Kundapur P.P., Hareesha K.S. A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. Secur. Commun. Netw. 2020;2020:4586875. doi: 10.1155/2020/4586875. [DOI] [Google Scholar]
  • 62.Abdullahi M., Baashar Y., Alhussian H., Alwadain A., Aziz N., Capretz L.F., Abdulkadir S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics. 2022;11:198. doi: 10.3390/electronics11020198. [DOI] [Google Scholar]
  • 63.Nanda S., Zafari F., DeCusatis C., Wedaa E., Yang B. Predicting network attack patterns in SDN using machine learning approach; Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN); Palo Alto, CA, USA. 7–9 November 2016; pp. 167–172. [DOI] [Google Scholar]
  • 64.Shon T., Kim Y., Lee C., Moon J. A machine learning framework for network anomaly detection using SVM and GA; Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop; West Point, NY, USA. 15–17 June 2005; [DOI] [Google Scholar]
  • 65.Wang P., Lin S.-C., Luo M. A Framework for QoS-aware Traffic Classification Using Semi-supervised Machine Learning in SDNs; Proceedings of the 2016 IEEE International Conference on Services Computing (SCC); San Francisco, CA, USA. 27 June–2 July 2016; pp. 760–765. [DOI] [Google Scholar]
  • 66.Wang J., Hong X., Ren R.R., Li T.H. A real-time intrusion detection system based on PSO-SVM. International Workshop on Information Security and Application; Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009); Wuhan, China. 23–24 May 2009. [Google Scholar]
  • 67.Bensalem M., Singh S.K., Jukan A. On Detecting and Preventing Jamming Attacks with Machine Learning in Optical Networks; Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM); Big Island, HI, USA. 9–13 December 2019; pp. 1–6. [DOI] [Google Scholar]
  • 68.Singhal P. Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks. Int. J. Netw. Secur. Its Appl. 2012;4:61–67. doi: 10.5121/ijnsa.2012.4106. [DOI] [Google Scholar]
  • 69.Al Naymat G., Al Kasassbeh M., Al Harwari E. Using machine learning methods for detecting network anomalies within SNMP-MIB dataset. Int. J. Wirel. Mob. Comput. 2018;15:67. doi: 10.1504/IJWMC.2018.094644. [DOI] [Google Scholar]
  • 70.Yong B., Wei W., Li K., Shen J., Zhou Q., Wozniak M., Połap D., Damaševičius R. Ensemble machine learning approaches for webshell detection in Internet of things environments. Trans. Emerg. Telecommun. Technol. 2020 doi: 10.1002/ett.4085. [DOI] [Google Scholar]
  • 71.Vashist A., Keats A., Dinakarrao S.M.P., Ganguly A. Securing a Wireless Network-on-Chip Against Jamming-Based Denial-of-Service and Eavesdropping Attacks. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2019;27:2781–2791. doi: 10.1109/TVLSI.2019.2928960. [DOI] [Google Scholar]
  • 72.Kang J., Xiong Z., Niyato D., Zou Y., Zhang Y., Guizani M. Reliable Federated Learning for Mobile Networks. IEEE Wirel. Commun. 2020;27:72–80. doi: 10.1109/MWC.001.1900119. [DOI] [Google Scholar]
  • 73.Luong N.C., Hoang D.T., Gong S., Niyato D., Wang P., Liang Y.-C., Kim D.I. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey. IEEE Commun. Surv. Tutor. 2019;21:3133–3174. doi: 10.1109/COMST.2019.2916583. [DOI] [Google Scholar]
  • 74.Rodriguez E., Otero B., Gutierrez N., Canal R. A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks. IEEE Commun. Surv. Tutor. 2021;23:1920–1955. doi: 10.1109/COMST.2021.3086296. [DOI] [Google Scholar]
  • 75.Xiao A., Liu J., Li Y., Song Q., Ge N. Two-phase rate adaptation strategy for improving real-time video QoE in mobile networks. China Commun. 2018;15:12–24. doi: 10.1109/CC.2018.8485465. [DOI] [Google Scholar]
  • 76.Rahim N., Ahmad J., Muhammad K., Sangaiah A.K., Baik S.W. Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput. Commun. 2018;127:75–85. doi: 10.1016/j.comcom.2018.06.001. [DOI] [Google Scholar]
  • 77.Zhong Y., Yuan Z., Zhao S., Luo X. A Wifi Positioning Method Based on Stack Auto Encoder; Proceedings of the 2018 7th International Conference on Digital Home (ICDH); Guilin, China. 30 November–1 December 2018; pp. 286–293. [DOI] [Google Scholar]
  • 78.Maimo L.F., Gomez A.L.P., Clemente F.J.G., Gil Pérez M., Perez G.M. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks. IEEE Access. 2018;6:7700–7712. doi: 10.1109/ACCESS.2018.2803446. [DOI] [Google Scholar]
  • 79.Wang Q., Yang H., Wang Q., Huang W., Deng B. A deep learning based data forwarding algorithm in mobile social networks. Peer-to-Peer Netw. Appl. 2019;12:1638–1650. doi: 10.1007/s12083-019-00741-3. [DOI] [Google Scholar]
  • 80.Guo L., Wang S., Yin J., Wang Y., Yang J., Gui G. Federated user activity analysis via network traffic and deep neural network in mobile wireless networks. Phys. Commun. 2021;48:101438. doi: 10.1016/j.phycom.2021.101438. [DOI] [Google Scholar]
  • 81.Arya G., Bagwari A., Chauhan D.S. Performance Analysis of Deep Learning-Based Routing Protocol for an Efficient Data Transmission in 5G WSN Communication. IEEE Access. 2022;10:9340–9356. doi: 10.1109/ACCESS.2022.3142082. [DOI] [Google Scholar]
  • 82.Kasongo S.M., Sun Y. A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 2020;92:101752. doi: 10.1016/j.cose.2020.101752. [DOI] [Google Scholar]
  • 83.Ullah F., Naeem H., Jabbar S., Khalid S., Latif M.A., Al-Turjman F., Mostarda L. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach. IEEE Access. 2019;7:124379–124389. doi: 10.1109/ACCESS.2019.2937347. [DOI] [Google Scholar]
  • 84.Chandy S.E., Rasekh A., Barker Z.A., Shafiee M.E. Cyberattack Detection Using Deep Generative Models with Variational Inference. J. Water Resour. Plan. Manag. 2019;145:04018093. doi: 10.1061/(ASCE)WR.1943-5452.0001007. [DOI] [Google Scholar]
  • 85.Kos J., Fischer I., Song D. Adversarial Examples for Generative Models; Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW); San Francisco, CA, USA. 21–23 May 2018; pp. 36–42. [DOI] [Google Scholar]
  • 86.Kim D., Ko M., Kim S., Moon S., Cheon K.-Y., Park S., Kim Y., Yoon H., Choi Y.-H. Design and Implementation of Traffic Generation Model and Spectrum Requirement Calculator for Private 5G Network. IEEE Access. 2022;10:15978–15993. doi: 10.1109/ACCESS.2022.3149050. [DOI] [Google Scholar]
  • 87.Alam M.R., Bennamoun M., Togneri R., Sohel F. A Joint Deep Boltzmann Machine (jDBM) Model for Person Identification Using Mobile Phone Data. IEEE Trans. Multimed. 2016;19:317–326. doi: 10.1109/TMM.2016.2615524. [DOI] [Google Scholar]
  • 88.Wang J., Lu S., Wang S.-H., Zhang Y.-D. A review on extreme learning machine. Multimed. Tools Appl. 2021:1–50. doi: 10.1007/s11042-021-11007-7. [DOI] [Google Scholar]
  • 89.Huang G.B., Zhu Q.Y., Siew C.K. Extreme learning machine: Theory and applications. Neurocomputing. 2016;70:489–501. [Google Scholar]
  • 90.Leung H.C., Leung C.S., Wong E.W.M. Fault and Noise Tolerance in the Incremental Extreme Learning Machine. IEEE Access. 2019;7:155171–155183. doi: 10.1109/ACCESS.2019.2948059. [DOI] [Google Scholar]
  • 91.She Q., Hu B., Gan H., Fan Y., Nguyen T., Potter T., Zhang Y. Safe Semi-Supervised Extreme Learning Machine for EEG Signal Classification. IEEE Access. 2018;6:49399–49407. doi: 10.1109/ACCESS.2018.2868713. [DOI] [Google Scholar]
  • 92.Rathore S., Park J.H. Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 2018;72:79–89. doi: 10.1016/j.asoc.2018.05.049. [DOI] [Google Scholar]
  • 93.Alimi O.A., Ouahada K., Abu-Mahfouz A.M., Rimer S., Alimi K.O.A. A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification. Sustainability. 2021;13:9597. doi: 10.3390/su13179597. [DOI] [Google Scholar]
  • 94.Ahmad W., Rasool A., Javed A.R., Baker T., Jalil Z. Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics. 2022;11:16. doi: 10.3390/electronics11010016. [DOI] [Google Scholar]
  • 95.McLaughlin N., del Rincon J.M., Kang B., Yerima S., Miller P., Sezer S., Safaei Y., Trickel E., Zhao Z., Doupe A., et al. Deep android malware detection; Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy; Scottsdale, AZ, USA. 22–24 March 2017; pp. 301–308. [Google Scholar]
  • 96.Aminanto M.E., Kwangjo K. Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer 1); Proceedings of the Korea Institutes of Information Security and Cryptology Conference; Seoul, Korea. 30 November–2 December 2016. [Google Scholar]
  • 97.Lotfollahi M., Siavoshani M.J., Zade R.S.H., Saberian M. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Comput. 2019;24:1999–2012. doi: 10.1007/s00500-019-04030-2. [DOI] [Google Scholar]
  • 98.AbdulNabi I., Yaseen Q. Spam Email Detection Using Deep Learning Techniques. Procedia Comput. Sci. 2021;184:853–858. doi: 10.1016/j.procs.2021.03.107. [DOI] [Google Scholar]
  • 99.He Y., Mendis G.J., Wei J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid. 2017;8:2505–2516. doi: 10.1109/TSG.2017.2703842. [DOI] [Google Scholar]
  • 100.Kobojek P., Saeed K. Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 2016;3:80–90. [Google Scholar]
  • 101.Cheng M., Xu Q., Lv J., Liu W., Li Q., Wang J. MS-LSTM: A multi-scale LSTM model for BGP anomaly detection; Proceedings of the IEEE 24th International Conference Network Protocols (ICNP); Singapore. 8–11 November 2016; pp. 1–6. [Google Scholar]
  • 102.Mac H., Tran D., Tong V., Nguyen L.G., Tran H.A. DGA Botnet Detection Using Supervised Learning Methods; Proceedings of the 8th International Symposium on Information and Communication Technology; Nhatrang, Vietnam. 7–8 December 2017; pp. 211–218. [Google Scholar]
  • 103.Yuan S., Wu X. Deep learning for insider threat detection: Review, challenges and opportunities. Comput. Secur. 2021;104:102221. doi: 10.1016/j.cose.2021.102221. [DOI] [Google Scholar]
  • 104.Hoque N., Bhattacharyya D.K., Kalita J.K. FFSc: A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis. Secur. Commun. Networks. 2016;9:2032–2041. doi: 10.1002/sec.1460. [DOI] [Google Scholar]
  • 105.Malik R., Alankar B. Botnet and Botnet Detection Techniques. Int. J. Comput. Appl. 2019;178:8–11. doi: 10.5120/ijca2019918967. [DOI] [Google Scholar]
  • 106.Tavallaee M., Bagheri E., Lu W., Ghorbani A. A detailed analysis of the KDD CUP 99 data set; Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications; Ottawa, ON, Canada. 8–10 July 2009; pp. 1–6. [DOI] [Google Scholar]
  • 107.Barthakur P., Dahal M., Ghose M.K. An Efficient Machine Learning Based Classification Scheme for Detecting Distributed Command & Control Traffic of P2P Botnets. Int. J. Mod. Educ. Comput. Sci. 2013;5:9–18. doi: 10.5815/ijmecs.2013.10.02. [DOI] [Google Scholar]
  • 108.Turcotte M.J.M., Kent A.D., Hash C. Data Science for Cyber-Security. World Scientific; Singapore: 2018. Unified Host and Network Data Set; pp. 1–22. [DOI] [Google Scholar]
  • 109.Joseph B. Yahoo Password Frequency Corpus. Figshare. [(accessed on 24 December 2015)]. Available online: https://figshare.com/articles/dataset/Yahoo_Password_Frequency_Corpus/2057937.
  • 110.Tyson G., Huang S., Cuadrado F., Castro I., Perta V.C., Sathiaseelan A., Uhlig S. Exploring HTTP Header Manipulation In-The-Wild; Proceedings of the 26th International Conference on World Wide Web; Perth, Australia. 3–7 April 2017; pp. 451–458. [DOI] [Google Scholar]
  • 111.Luo S.Q., Ni B., Jiang P., Tian S.W., Yu L., Wang R.J. Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection. KSII Trans. Internet Inf. Syst. 2019;13:3654–3670. doi: 10.3837/tiis.2019.07.018. [DOI] [Google Scholar]
  • 112.Roziewski S., Kozłowski M. LanguageCrawl: A generic tool for building language models upon common Crawl. Comput. Humanit. 2021;55:1047–1075. doi: 10.1007/s10579-021-09551-7. [DOI] [Google Scholar]
  • 113.Onwubiko C., Lenaghan A.P. Challenges and complexities of managing information security. Int. J. Electron. Secur. Digit. Forensics. 2009;2:306–321. doi: 10.1504/IJESDF.2009.027524. [DOI] [Google Scholar]
  • 114.Choobineh J., Dhillon G., Grimaila M.R., Rees J. Management of Information Security: Challenges and Research Directions. Commun. Assoc. Inf. Syst. 2007;20:57. doi: 10.17705/1CAIS.02057. [DOI] [Google Scholar]
  • 115.Anand A., Gokhale A.A. 1 Impact of available resources on software patch management. Syst. Perform. Modeling. 2020;4:1–12. doi: 10.1515/9783110619058-001. [DOI] [Google Scholar]
  • 116.Appling D.S., Briscoe E.J., Hutto C.J. Discriminative Models for Predicting Deception Strategies; Proceedings of the 24th International Conference on World Wide Web; Florence, Italy. 18–22 May 2015; pp. 947–952. [DOI] [Google Scholar]
  • 117.Ashenden D. Information Security management: A human challenge? Inf. Secur. Tech. Rep. 2008;13:195–201. doi: 10.1016/j.istr.2008.10.006. [DOI] [Google Scholar]
  • 118.Laszka A., Felegyhazi M., Buttyan L. A Survey of Interdependent Information Security Games. ACM Comput. Surv. 2015;47:1–38. doi: 10.1145/2635673. [DOI] [Google Scholar]
  • 119.Kumaar M.A., Samiayya D., Vincent P.M.D.R., Srinivasan K., Chang C.-Y., Ganesh H. A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning. Front. Public Health. 2022;9:824898. doi: 10.3389/fpubh.2021.824898. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 120.Angel N.A., Ravindran D., Vincent P.M.D.R., Srinivasan K., Hu Y.-C. Recent Advances in Evolving Computing Paradigms: Cloud, Edge, and Fog Technologies. Sensors. 2021;22:196. doi: 10.3390/s22010196. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 121.Mamdiwar S.D., Shakruwala Z., Chadha U., Srinivasan K., Chang C.-Y. Recent Advances on IoT-Assisted Wearable Sensor Systems for Healthcare Monitoring. Biosensors. 2021;11:372. doi: 10.3390/bios11100372. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 122.Patel D., Srinivasan K., Chang C.-Y., Gupta T., Kataria A. Network Anomaly Detection inside Consumer Networks—A Hybrid Approach. Electronics. 2020;9:923. doi: 10.3390/electronics9060923. [DOI] [Google Scholar]
  • 123.Oliveira N., Praça I., Maia E., Sousa O. Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems. Appl. Sci. 2021;11:1674. doi: 10.3390/app11041674. [DOI] [Google Scholar]
  • 124.Nisa M., Shah J.H., Kanwal S., Raza M., Khan M.A., Damaševičius R., Blažauskas T. Hybrid Malware Classification Method Using Segmentation-Based Fractal Texture Analysis and Deep Convolution Neural Network Features. Appl. Sci. 2020;10:4966. doi: 10.3390/app10144966. [DOI] [Google Scholar]
  • 125.Nasralla M.M., Garcia-Magarino I., Lloret J. Defenses Against Perception-Layer Attacks on IoT Smart Furniture for Impaired People. IEEE Access. 2020;8:119795–119805. doi: 10.1109/ACCESS.2020.3004814. [DOI] [Google Scholar]
  • 126.Guo J., Nazir S. Internet of Things Based Intelligent Techniques in Workable Computing: An Overview. Sci. Program. 2021;2021:1–15. doi: 10.1155/2021/6805104. [DOI] [Google Scholar]
  • 127.Khan M.A., Nasralla M.M., Umar M.M., Rehman G.U., Khan S., Choudhury N. An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks. Sensors. 2022;22:410. doi: 10.3390/s22020410. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 128.Chabaa S., Zeroual A., Antari J. Identification and Prediction of Internet Traffic Using Artificial Neural Networks. J. Intell. Learn. Syst. Appl. 2010;2:147–155. doi: 10.4236/jilsa.2010.23018. [DOI] [Google Scholar]
  • 129.Shuai Y., Xu C., Zhi Z., Xiaowen G., Di W. When Deep Reinforcement Learning Meets Federated Learning: Intelligent Multi-Timescale Resource Management for Multi-access Edge Computing in 5G Ultra Dense Network. IEEE Internet Things J. 2020;8:2238–2251. [Google Scholar]
  • 130.Li J.-H. Cyber security meets artificial intelligence: A survey. Front. Inf. Technol. Electron. Eng. 2018;19:1462–1474. doi: 10.1631/FITEE.1800573. [DOI] [Google Scholar]
  • 131.Hughes-Lartey K., Li M., Botchey F.E., Qin Z. Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon. 2021;7:e06522. doi: 10.1016/j.heliyon.2021.e06522. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 132.Cram W.A., University of Waterloo. Proudfoot J.G., D’Arcy J., Bentley University. University of Delaware Maximizing Employee Compliance with Cybersecurity Policies. MIS Q. Exec. 2020:183–198. doi: 10.17705/2msqe.00032. [DOI] [Google Scholar]
  • 133.Bal P.K., Mohapatra S.K., Das T.K., Srinivasan K., Hu Y.-C. A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques. Sensors. 2022;22:1242. doi: 10.3390/s22031242. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 134.Chadwick D.W., Fan W., Costantino G., de Lemos R., Di Cerbo F., Herwono I., Manea M., Mori P., Sajjad A., Wang X.-S. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Gener. Comput. Syst. 2020;102:710–722. doi: 10.1016/j.future.2019.06.026. [DOI] [Google Scholar]
  • 135.Gupta A., Srinivasan K. Quantum Computing: A Brief Study; Proceedings of the 2019 IEEE International Conference on Consumer Electronics—Taiwan (ICCE-TW); Yilan, Taiwan. 20–22 May 2019; pp. 1–2. [DOI] [Google Scholar]
  • 136.Badsha S., Vakilinia I., Sengupta S. Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense; Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC); Las Vegas, NV, USA. 7–9 January 2019; pp. 0708–0714. [DOI] [Google Scholar]
  • 137.Mavroeidis V., Bromander S. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence; Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC); Athens, Greece. 11–13 September 2017; pp. 91–98. [DOI] [Google Scholar]
  • 138.Hrri J., Bonnet C. Wireless and Mobile Network Security. John Wiley and Sons; Hoboken, NJ, USA: 2009. Security in Mobile Telecommunication Networks; pp. 315–360. [DOI] [Google Scholar]
  • 139.Xie J., Jiang S., Xie W., Gao X. An Efficient Global K-means Clustering Algorithm. J. Comput. 2011;6:271–279. doi: 10.4304/jcp.6.2.271-279. [DOI] [Google Scholar]
  • 140.Datta D., Garg L., Srinivasan K., Inoue A.G., Thippa G.R., Praveen M.K.R., Ramesh K., Nasser N. An Efficient Sound and Data Steganography Based Secure Authentication System. Comput. Mater. Contin. 2021;67:723–751. doi: 10.32604/cmc.2021.014802. [DOI] [Google Scholar]
  • 141.Ahmad I., Basheri M., Iqbal M.J., Rahim A. Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection. IEEE Access. 2018;6:33789–33795. doi: 10.1109/ACCESS.2018.2841987. [DOI] [Google Scholar]
  • 142.Liu H., Lang B. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci. 2019;9:4396. doi: 10.3390/app9204396. [DOI] [Google Scholar]
  • 143.Sharma V., Srinivasan K. QoS-Aware Routing in Wireless Networks Using Aerial Vehicles. J. Internet Technol. 2018;19:73–89. doi: 10.3966/16079264201801901007. [DOI] [Google Scholar]
  • 144.Ogino T. Evaluation of Machine Learning Method for Intrusion Detection System on Jubatus. Int. J. Mach. Learn. Comput. 2015;5:137–141. doi: 10.7763/IJMLC.2015.V5.497. [DOI] [Google Scholar]
  • 145.Kumar N.S., Vincent P.M.D.R., Srinivasan K., Rajagopal S., Angayarkanni S.A., Alhadidi B. Role of M-CORD Computing Architecture for Over the Top (OTT) Services and Applications; Proceedings of the International Conference on Innovative Computing and Cuttingedge Technologies; Istanbul, Turkey. 30–31 October 2021; pp. 75–86. [DOI] [Google Scholar]
  • 146.Ma X., Zhang X., Dong C., Chen X. Cyber Security Meets Machine Learning. Springer; Berlin/Heidelberg, Germany: 2021. A Survey on Secure Outsourced Deep Learning; pp. 129–163. [DOI] [Google Scholar]
  • 147.Letaief K.B., Chen W., Shi Y., Zhang J., Zhang Y.-J.A. The Roadmap to 6G: AI Empowered Wireless Networks. IEEE Commun. Mag. 2019;57:84–90. doi: 10.1109/MCOM.2019.1900271. [DOI] [Google Scholar]
  • 148.Sesto-Castilla D., Garcia-Villegas E., Lyberopoulos G., Theodoropoulou E. Use of Machine Learning for energy efficiency in present and future mobile networks; Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC); Marrakesh, Morocco. 15–18 April 2019. [Google Scholar]
  • 149.Ding X. Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization. J. Inf. Secur. 2016;07:297–303. doi: 10.4236/jis.2016.75025. [DOI] [Google Scholar]
  • 150.Sriram P.P., Wang H.-C., Jami H.G., Srinivasan K. 5G Security: Concepts and Challenges. Springer International Publishing; Berlin/Heidelberg, Germany: 2019. pp. 1–43. [DOI] [Google Scholar]
  • 151.Kotenko I., Izrailov K., Buinevich M. Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches. Sensors. 2022;22:1335. doi: 10.3390/s22041335. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 152.Dai H.-N., Wong R.C.-W., Wang H., Zheng Z., Vasilakos A.V. Big Data Analytics for Large-scale Wireless Networks. ACM Comput. Surv. 2020;52:1–36. doi: 10.1145/3337065. [DOI] [Google Scholar]
  • 153.Srinivasan K., Garg L., Chen B.-Y., Alaboudi A.A., Jhanjhi N.Z., Chang C.-T., Prabadevi B., Deepa N. Expert System for Stable Power Generation Prediction in Microbial Fuel Cell. Intell. Autom. Soft Comput. 2021;29:17–30. doi: 10.32604/iasc.2021.018380. [DOI] [Google Scholar]
  • 154.Zwilling M. Trends and Challenges Regarding Cyber Risk Mitigation by CISOs—A Systematic Literature and Experts’ Opinion Review Based on Text Analytics. Sustainability. 2022;14:1311. doi: 10.3390/su14031311. [DOI] [Google Scholar]
  • 155.Schlatt V., Guggenberger T., Schmid J., Urbach N. Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity. Int. J. Inf. Manag. 2022:102470. doi: 10.1016/j.ijinfomgt.2022.102470. [DOI] [Google Scholar]
  • 156.Yang B., Guo H., Cao E. Advances in Computers. Elsevier; Amsterdam, The Netherlands: 2020. Design of cyber-physical-social systems with forensic-awareness based on deep learning; pp. 39–79. [DOI] [Google Scholar]
  • 157.Luo G. Extension clustering-based extreme learning machine neural network. J. Comput. Appl. 2013;33:1942–1945. doi: 10.3724/SP.J.1087.2013.01942. [DOI] [Google Scholar]
  • 158.Srinivasan K., Garg L., Datta D., Alaboudi A.A., Jhanjhi N.Z., Agarwal R., Thomas A.G. Performance Comparison of Deep CNN Models for Detecting Driver’s Distraction. Comput. Mater. Contin. 2021;68:4109–4124. doi: 10.32604/cmc.2021.016736. [DOI] [Google Scholar]
  • 159.Geetha R., Thilagam T. A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security. Arch. Comput. Methods Eng. 2020;28:2861–2879. doi: 10.1007/s11831-020-09478-2. [DOI] [Google Scholar]
  • 160.Duan Y., Edwards J.S., Dwivedi Y.K. Artificial intelligence for decision making in the era of Big Data—Evolution, challenges and research agenda. Int. J. Inf. Manag. 2019;48:63–71. doi: 10.1016/j.ijinfomgt.2019.01.021. [DOI] [Google Scholar]
  • 161.Arel I., Rose D.C., Karnowski T.P. Deep Machine Learning—A New Frontier in Artificial Intelligence Research [Research Frontier] IEEE Comput. Intell. Mag. 2010;5:13–18. doi: 10.1109/MCI.2010.938364. [DOI] [Google Scholar]
  • 162.Xiao G., Li J., Chen Y., Li K. MalFCS: An effective malware classification framework with automated feature extraction based on deep convolutional neural networks. J. Parallel Distrib. Comput. 2020;141:49–58. doi: 10.1016/j.jpdc.2020.03.012. [DOI] [Google Scholar]
  • 163.Srinivasan K., Agrawal N.K. A study on M-CORD based architecture in traffic offloading for 5G-enabled multiaccess edge computing networks; Proceedings of the 2018 IEEE International Conference on Applied System Invention (ICASI); Chiba, Japan. 13–17 April 2018; pp. 303–307. [DOI] [Google Scholar]
  • 164.Oppliger R. Intrusion Detection; Network Security Beyond the Firewall. Comput. Commun. 2000;23:429. doi: 10.1016/S0140-3664(99)00187-5. [DOI] [Google Scholar]
  • 165.Buschkes R., Kesdogan D., Reichl P. How to increase security in mobile networks by anomaly detection; Proceedings of the 14th Annual Computer Security Applications Conference (Cat. No. 98EX217); Phoenix, AZ, USA. 7–11 December 1998; pp. 3–12. [DOI] [Google Scholar]
  • 166.Looi M. Enhanced authentication services for Internet systems using mobile networks; Proceedings of the GLOBECOM’01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270); San Antonio, TX, USA. 21–29 November 2001; pp. 3468–3472. [DOI] [Google Scholar]
  • 167.Srinivasan K., Cherukuri A.K., Das T.K. Innovations in the Industrial Internet of Things (IIoT) and Smart Factory. IGI Global; Hershey, PA, USA: 2021. Realizing a Ultra-Low Latency M-CORD Model for Real-Time Traffic Settings in Smart Cities; pp. 93–105. [DOI] [Google Scholar]
  • 168.Taherdoost H. A Review on Risk Management in Information Systems: Risk Policy, Control and Fraud Detection. Electronics. 2021;10:3065. doi: 10.3390/electronics10243065. [DOI] [Google Scholar]
  • 169.Chellappa R.K., Pavlou P.A. Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logist. Inf. Manag. 2002;15:358–368. doi: 10.1108/09576050210447046. [DOI] [Google Scholar]
  • 170.Srinivasan K., Agrawal N.K., Cherukuri A.K., Pounjeba J. An M-CORD Architecture for Multi-Access Edge Computing: A Review; Proceedings of the 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW); Taichung, Taiwan. 19–21 May 2018; pp. 1–2. [DOI] [Google Scholar]
  • 171.Höne K., Eloff J. Information security policy—What do international information security standards say? Comput. Secur. 2002;21:402–409. doi: 10.1016/S0167-4048(02)00504-7. [DOI] [Google Scholar]
  • 172.Baskerville R., Siponen M. An information security meta-policy for emergent organizations. Logist. Inf. Manag. 2002;15:337–346. doi: 10.1108/09576050210447019. [DOI] [Google Scholar]
  • 173.Srinivasan K., Mahendran N., Vincent D.R., Chang C.-Y., Syed-Abdul S. Realizing an Integrated Multistage Support Vector Machine Model for Augmented Recognition of Unipolar Depression. Electronics. 2020;9:647. doi: 10.3390/electronics9040647. [DOI] [Google Scholar]
  • 174.Afifi M.A. Assessing Information Security Vulnerabilities and Threats to Implementing Security Mechanism and Security Policy Audit. J. Comput. Sci. 2020;16:321–329. doi: 10.3844/jcssp.2020.321.329. [DOI] [Google Scholar]
  • 175.Shang W., Gong T., Chen C., Hou J., Zeng P. Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. Secur. Commun. Networks. 2019;2019:3574675. doi: 10.1155/2019/3574675. [DOI] [Google Scholar]
  • 176.Kumar R., Goel S., Sharma V., Garg L., Srinivasan K., Julka N. A Multifaceted Vigilare System for Intelligent Transportation Services in Smart Cities. IEEE Internet Things Mag. 2020;3:76–80. doi: 10.1109/IOTM.0001.2000041. [DOI] [Google Scholar]
  • 177.Al-Karaki J.N., Kamal A.E. End-to-end support for statistical quality of service in heterogeneous mobile ad hoc networks. Comput. Commun. 2005;28:2119–2132. doi: 10.1016/j.comcom.2004.07.038. [DOI] [Google Scholar]
  • 178.Fichtner L. What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Rev. 2018;7 doi: 10.14763/2018.2.788. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES