Skip to main content
. 2022 Mar 4;22(5):2017. doi: 10.3390/s22052017

Table 3.

A summary of works on deep learning models for electronic information security.

Reference Security-Category Deep Learning Models Used Key Contribution Limitations
[95] Malware Detection Deep Convolutional Neural Network (DCNN)
  • Hand-engineered malware features have no requirement.

  • To make the process easier, the network is trained end-to-end to understand suitable properties and conduct classifications.

  • After the model has been trained, it may be effectively and executed on a GPU with efficiency, permitting a large number of files to be scanned rapidly.

  • For dynamic and static malware detection on several platforms, it is impractical.

  • Malware detection is incompatible with the design and creation of data augmentation methods.

[96] Intrusion Detection System (IDS) Artificial Neural Network (ANN), Stacked Auto Encoder (SAE)
  • Select the most important features only to reduce their dimensionality.

  • It is suitable for resource-constrained devices.

  • The reduced input features are sufficient for classification tasks.

  • Limited to lightweight IDS.

  • The issue of a wireless network is difficult to solve.

[97] Network Traffic Identification Stacked autoencoder and one-dimensional convolution neural network (CNN)
  • Both of the tasks such as traffic characterization and application identification are dealt with.

  • Automatic feature extraction saves time and money by eliminating the need for experts to detect and extract handmade elements from traffic, resulting in higher accuracy for traffic classification.

  • Low efficiency for multi-channel (e.g., differentiating between various types of Skype traffic such as that of chats, video and voice calls) classification and accuracy in classifying Tor’s traffic, etc.

[98] Spam Email Detection Bidirectional Encoder Representations from Transformers (BERT)
  • Effectiveness of word embedding because of hyper-parameter fine-tuning.

  • 98.67% and 98.66% F1 score indicating persistence and robustness of the model.

  • Smaller input sequence taken.

  • Not valid for text in other languages such as Arabic, etc.

[78] Intrusion Detection (5G) RBM; RNN
  • It can manage traffic fluctuation.

  • Optimising the computational resources at any point in time along with refining the performance and behaviour of analysis and detection procedures is the primary goal.

  • The architecture may adapt and adjust by itself the anomaly detection system depending on the amount of network flows gathered in real-time from 5G subscribers’ user equipment, reducing resource consumption and maximising efficiency.

  • Because of the abundance of network traffic handled by a RAN, accuracy suffers.

  • Model is not trained for a real-time environment.

[99] False Data Injection RBM
  • The detection scheme is unaffected by the number of attacked data, SVE detection thresholds, and certain degrees of noise in the surroundings.

  • Model can achieve high accuracy for detection in presence of the operation faults occurring now and then.

  • More realistic FDI attack behaviours are necessary in the model, along with an analysis of the smallest number of sensing units.

[100] Keystroke Verification RNN
  • A high scalability in terms of user count as well as good precision avoiding false positive errors

  • Takes more time to be fully trained.

  • The classification algorithm selection was affected under the assumption by authors that keystroke dynamics data was sequence-based.

[101] Border Gateway Protocol Anomaly Detection RNN
  • Solve the problem of bursts and noise in dynamic Internet traffic that occur regularly.

  • It learns and grasps traffic patterns using historical features in a sliding time span.

  • The classifier performs well.

  • It’s vulnerable to overfitting, and using the dropout algorithm to prevent it is challenging.

  • This method is affected by various random weight initialization.

[102] DGA CNN RNN
  • Amenable for real-time detection.

  • There were 8 DGA that the model was not able to detect.

[103] Insider Threat DFNN RNN CNN GNN
  • DFNN: To detect anomalies one can employ the concept of utilising a deep autoencoder.

  • RNN: Capturing temporal information of the users’ activity sequences.

  • CNN: Great accuracy and precision if the data of a users’ activity can be represented in the form of images.

  • GNN: Organisation information networks are fairly powerful to model the graph data.

  • Data that is extremely unbalanced.

  • In attacks, there is a lot of temporal information.

  • Fusion of heterogeneous data.

  • There aren’t any practical evaluation metrics.

  • Interpretability.

  • Subtle and Adaptive Threats.

  • Fine-grained Detection.