A Survey On Representation Learning Efforts in Cybersecurity Domain
A Survey On Representation Learning Efforts in Cybersecurity Domain
in Cybersecurity Domain
In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Traditional
cybersecurity approaches are based on old threat-knowledge databases and need to be updated on a daily ba-
sis to stand against new generation of cyber-threats and protect underlying network-based systems. Along
with updating threat-knowledge databases, there is a need for proper management and processing of data
generated by sensitive real-time applications. In recent years, various computing platforms based on repre-
sentation learning algorithms have emerged as a useful resource to manage and exploit the generated data to
extract meaningful information. If these platforms are properly utilized, then strong cybersecurity systems
can be developed to protect the underlying network-based systems and support sensitive real-time applica-
tions. In this survey, we highlight various cyber-threats, real-life examples, and initiatives taken by various 111
international organizations. We discuss various computing platforms based on representation learning al-
gorithms to process and analyze the generated data. We highlight various popular datasets introduced by
well-known global organizations that can be used to train the representation learning algorithms to predict
and detect threats. We also provide an in-depth analysis of research efforts based on representation learning
algorithms made in recent years to protect the underlying network-based systems against current cyber-
threats. Finally, we highlight various limitations and challenges in these efforts and available datasets that
need to be considered when using them to build cybersecurity systems.
CCS Concepts: • Security and privacy → Systems security; Network security; • Computing method-
ologies → Machine learning; Distributed computing methodologies;
Additional Key Words and Phrases: Cyber-attacks, cybersecurity, computing, representation learning,
datasets
ACM Reference format:
Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Jinjun Chen. 2019. A Survey on Representation
Learning Efforts in Cybersecurity Domain. ACM Comput. Surv. 52, 6, Article 111 (October 2019), 28 pages.
https://doi.org/10.1145/3331174
Authors’ addresses: M. Usman, Swinburne University of Technology, Hawthorn Campus, 3122, Melbourne, Victoria, Aus-
tralia; email: [email protected]; M. A. Jan, Abdul Wali Khan University Mardan, Garden Campus, 23200,
Mardan, Khyber Pakhtunkhwa, Pakistan; email: [email protected]; X. He, University of Technology Sydney, Broad-
way Campus, 2007, Sydney, New South Wales, Australia; email: [email protected]; J. Chen, Swinburne University
of Technology, Hawthorn Campus, 3122, Melbourne, Victoria, Australia; email: [email protected].
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from [email protected].
© 2019 Association for Computing Machinery.
0360-0300/2019/10-ART111 $15.00
https://doi.org/10.1145/3331174
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:2 M. Usman et al.
1 INTRODUCTION
In this Internet-based era, millions of devices are connected to the Internet. These devices help in
enhancing the performance of various applications by sharing various computational and storage
resources. These devices and the connections between them need to be protected using various cy-
bersecurity technologies. Physical devices and cybersecurity technologies together build systems
known as cybersecurity systems [15, 47, 108]. These systems are used to support various critical
applications, such as transportation management, healthcare, surveillance systems, and environ-
mental monitoring, in environments like smart cities. These applications operate in real time and
generate big sensitive data. Furthermore, these applications need to be protected from internal
and external threats [5, 25, 42, 52, 53, 61, 136, 138]. To protect these applications and the gener-
ated data, there is a need for strong cybersecurity systems that can analyze the generated data
in real time. The cybersecurity systems need to support different types of connections, devices,
and applications. These systems need to be updated automatically and provide protection to the
underlying network-based systems and applications running on them from cyber-threats. In the
traditional network-based systems, multiple cybersecurity applications are used together to pro-
tect connected devices from various threats [28, 49, 112, 129]. These applications help in detecting
and identifying attacks in various forms, e.g., unauthorized access, viruses, and privacy leakage.
Furthermore, they save the underlying network-based systems from possible physical destruction
and manipulation of data. The cyber-attacks can be internal or external. The cybersecurity applica-
tions detect and identify these attacks through known signatures or by analyzing the behaviors of
the underlying systems. In the signature-based detection category, knowledge-based databases are
required. These databases need to be updated manually. As a result, the cybersecurity applications
falling in this category are not feasible for real-time applications and systems [16, 96, 117, 137]. In
the behavior analysis category, the behaviors of underlying systems are analyzed continuously to
differentiate between normal and abnormal activities [7, 26, 27, 105, 147]. This category is useful
for real-time systems; however, it has a very high ratio of false alarms and may disrupt the per-
formances of underlying systems. Limitations in existing signature-based detection and behavior
analysis categories make the job of attackers and intruders easy and they can enter the systems
through hidden doors. Therefore, there is a need to analyze and study existing and newly devel-
oped cybersecurity systems and applications to highlight their weaknesses and suggest possible
improvements by incorporating machine-learning algorithms.
In the recent years, many researchers have started using machine-learning algorithms in the
cybersecurity domain to train Intrusion Detection Systems (IDS) and Intrusion Prevention Systems
(IPS) [2, 101]. To accurately identify various cyber-attacks, the behaviors of the underlying systems
and the generated data need to be analyzed carefully. In real-time environments, the network-
based systems generate huge volumes of data. To process and analyze the generated big data,
different machine-learning and data mining algorithms can be utilized to detect anomalies, identify
threats, and classify familiar and unfamiliar entities as shown in Figure 1. The machine-learning
and data mining algorithms can further be classified into various subcategories, from which the
most popular one is representation learning algorithms. The representation learning algorithms
allow a system to automatically discover representations required to detect or classify features
from raw input data. This category consists of well-known machine-learning algorithms from
supervised, unsupervised, and deep architectures to support a diverse range of applications. If
these algorithms are utilized properly, then new intelligent IDS and IPS can be designed to make
intelligent and quick decisions with high accuracy levels by learning from real-time data generated
by network-based systems at low computational costs.
In this survey, we focus on the use of representation learning algorithms in the cybersecu-
rity domain. Many survey papers on machine-learning algorithms can be found in the literature
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:3
[2, 13, 98, 127]. However, these papers discuss machine-learning algorithms in general and there
is no specific survey on representation learning algorithms for cybersecurity applications. In our
survey article, we review literature on various representation learning algorithms. To the best of
our knowledge, this article is the first survey on representation learning algorithms for cyberse-
curity applications. Our intention is to provide an overview of representation learning algorithms
that can be used to process generated data for various purposes in the cybersecurity domain. There
are multiple subdomains in cybersecurity, e.g., security, privacy, forensics, and so on. In this ar-
ticle, we narrow down our literature and target security domain only. We discuss well-known
cyber-attacks and collaborations between various international organizations. We review popu-
lar computing platforms based on representation learning algorithms. These computing platforms
are managed by well-known vendors. We discuss various publicly available datasets designed for
machine-learning-based cybersecurity systems. We also discuss most recent advancements based
on representation learning algorithms for cybersecurity systems. In the end, we highlight limi-
tations and research challenges when using the representation learning algorithms and publicly
available datasets to design cybersecurity systems for real-time applications along with possible
future research directions. The main contributions of this survey are listed below.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:4 M. Usman et al.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:5
2.1.1 Polymorphic Attacks. The polymorphic attacks are a type of attacks in which the code of
a malicious program changes itself each time when it runs, but the function of the code (its seman-
tics) does not change at all. The polymorphic attacks spread from one device to another device and
travel in a network. This category of attacks includes worms, viruses, and Trojans [37]. Real-life
examples in the recent years include The Storm worm (2007) [58] and Virlock ransomware family
(2014) [106]. The main purpose of these attacks is to evade cybersecurity systems and introduce
different effects, e.g., hiding files, changing file names, and corrupting root directories. Once en-
tered the systems, the attacking applications create multiple instances with the same purpose.
However, the payload of each instance can have a different code and, if detected, the cybersecurity
systems may not reliably predict the next attack. The polymorphic attacks make the instances look
different from each other to successfully blended in the network traffic. As a result, the attacks can
easily bypass the cybersecurity systems that rely on signatures or payload-based statistics. There
are different vendors that create and distribute various signatures-based attacks to sell their secu-
rity products in the consumer market. As a result, clients constantly purchase their products and
become a part of a cycle that is beneficial to them and the attackers.
2.1.2 Persistent Attacks. The persistent attacks, also known as advanced persistent threats, con-
sist of continuous and stealthy computer hacking processes to target a specific entity or an entire
system [20]. Real-life examples in the recent years include the Titan Rain (2003) [40], Sykipot At-
tacks (2006) [121], GhostNet (2009) [113], Stuxnet Worm (2010) [69], and Deep Panda (2015) [45].
These attacks usually target private and public organizations and states with political and financial
motives. These attacks rely on malware to exploit weak points of the targeted system. The main
motive of these types of attacks is to monitor the activities or extract sensitive information from
the targeted systems. Techniques like social engineering, supply-chain compromises, and infected
media can also be used in these attacks. In the persistent attacks, a malicious code is usually placed
in one or two computers of an organization for a long period to secretly monitor organizational
activities, store sensitive information, and transmit the collected information to an intended des-
tination. This category of attacks just monitors the targeted systems and does not destroy them.
Their main targets are always specific organizations rather than individuals.
2.1.3 Composite Attacks. In the cybersecurity domain, two most popular attacks are syntactic
and semantic attacks. The composite attacks are formed by combining these two types of attacks.
The syntactic attacks are straightforward and operate at the software level. These attacks exploit
technical vulnerabilities of a software to steal targeted data. Examples include viruses, worms, and
Trojan horses [22]. Real-life examples of syntactic attacks in recent years include CryptoLocker
(2013) [80], Stuxnet Worm (2010) [69], and Deep Panda (2015) [45]. However, semantic attacks try
to modify correct information to set someone in a wrong direction [55]. Examples include phishing,
application and file masquerading, false pop-ups, malware advertisements on websites, game and
friend requests on social websites, and attacks through removable media [54]. In recent years,
the composite attacks have gained in popularity. The attackers use social engineering techniques
to gain access to privileged information and then apply an attack to bring harm to the targeted
network or device. A well-known example of composite attacks is the phishing attack, also known
as online scams [140].
2.1.4 Zero-Day Attacks. This is another software level attack and usually unknown to those
(e.g., vendors) who mitigate this attack. It is named zero-day, because this attack is launched be-
fore a vendor gets aware [71]. This type of attack is very effective, because it can go undetectable
for a long period, e.g., weeks or months. Even after detection, days or weeks are taken to elimi-
nate its effects. Until the vulnerability is detected, the attackers can exploit the targeted systems
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:6 M. Usman et al.
or applications. This attack can be applied in different forms, such as worms and viruses. Real-
life examples of zero-day attacks in the recent years include EternalBlue (2017) and WannaCry
ransomware (2017) [68].
2.2.1 Computer Emerging Response Team. In The Computer Emerging Response Team (CERT),
experts deal with incidents related to computer security [51]. This team is also known by other
names, e.g., security incident response group or emergency readiness group. The CERT works on a
regional level and collects information about cyber-attacks from various sources. After collecting
the information, it can issue early warnings and provide help when requested. Due to its regional
support, there are many groups linked to this team, and they are working together or indepen-
dently in different countries. Cooperation between these groups on a global level is required to
spread awareness about various cyber-attacks and available solutions.
2.2.2 Forum for Incident Response and Security Team. The Forum for Incident Response and
Security Team (FIRST) is a globally recognized team. It is responsible for taking quick action on
reported incidents in the cybersecurity domain. Member countries forward security incidents to
different incident response teams of FIRST for further action. FIRST provides a platform to vari-
ous governmental, educational, and commercial organizations so that they can share services of
their computer security incident response teams. The main purpose is to foster coordination and
cooperation for incident prevention, rapidly react to the reported incidents, and share reported
information among member countries. Currently, more than 400 regions from different countries
in different continents, e.g., Africa, America, Asia, and Europe, are members of FIRST [99].
2.2.3 European Union Network and Information Security Agency. The European Union Network
and Information Security Agency (ENISA) is a center to provide cybersecurity services to Euro-
pean countries [100]. It prepares and equips European countries to detect, prevent, and respond
to various information security problems. It provides practical advice and solutions to its member
European countries. It also helps in organizing different exercises related to cyber-crises, devel-
oping national cybersecurity strategies, and promoting cooperation between the CERTs. It is also
involved in publishing reports and studies on various cybersecurity issues in various domains,
e.g., cloud security, ensuring privacy in new networking technologies, electronic trust services,
and identifying cyber-attacks.
2.2.4 Computer Security Division. The Computer Security Division (CDS) is one of seven tech-
nical divisions in the information technology laboratory at the National Institute of Standards and
Technology [60]. It develops tests for standards, metrics, and guidelines to protect federal infor-
mation systems. The standards and tools are developed in transparent and collaborative ways by
involving experts around the world. The developed standards can voluntarily be adopted by var-
ious organizations due to their global acceptance. The main purpose of the developed standards
is to deal with the present and future challenges related to information security. These standards
provide methodologies to develop practical security applications and technologies. In 2015, this
division was divided into two subdivisions, where the first division deals with computer security
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:7
and the second division deals with applied cybersecurity problems. These two subdivisions work
closely together on various programs and projects.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:8 M. Usman et al.
on data manipulation and experimentation to design and deliver the required products. The main
purpose of this section is to inform readers and developers in the cybersecurity domain about var-
ious well-known APIs that can be used when designing cybersecurity systems based on machine-
or representation learning algorithms. These APIs offer simple interfaces, instructions, and easy
manuals so that the developers can use them without having a strong background in the machine-
or representation learning domain. Furthermore, online help is also available if the developers are
stuck at some point when using any of these tools. These APIs are explained in the following sub-
sections. Furthermore, a comparison between these APIs in terms of capabilities and support is
provided in Table 1.
3.1.1 IBM Watson API. This API helps in simplifying data preparation and analysis processes.
Results of data analysis can be displayed by various visual tools. It is a free API and available for
public use through IBM’s Bluemix cloud service platform [118, 125]. It helps developers to develop
applications, services, and products with cognitive skills. The IBM Watson platform offers more
than 25 APIs powered by 50 different technologies. Some of the features offered by this API are
listed below.
• It can interpret text in different language pairs using machine translation.
• It can estimate popularity of a specific word or phrase using message resonance.
• It can provide answers to questions triggered by primary document resources.
• It can predict social characteristics of human beings from a given text.
3.1.2 Microsoft Azure API. This API is designed for data scientists and help them to perform a
quick data analysis. It also helps them by saving their time from developing complex representation
learning models. This API can be used to analyze multimedia data collected from diverse resources.
With the help of predictive models, various abnormal events in different scenarios can be predicted
using this API. It is available in various Microsoft products, e.g., Xbox and Bing, and offers strong
representation learning abilities [9, 124]. Some of the strong features offered by this API are listed
below.
• By using this API, data scientists can develop customized and configurable models to train
and predict tasks based on their own R language code.
• By using various Python libraries, e.g., SciPy, Pandas, and NumPy, data scientists can in-
clude Python language scripts in this API. It also supports other popular Python tools, e.g.,
iPython Notebook, and Visual Studio-based tools.
• By using this API, data scientists can train petabytes of data using Principal Component
Analysis (PCA) or Support Vector Machines (SVMs) to predict malicious behavior in the
multimedia data.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:9
• It supports other data processing platforms, e.g., Hadoop and Spark, to process huge vol-
umes of big multimedia data.
3.1.3 Google Prediction API. This API is useful for real-time applications to quickly process
collected big multimedia data. It is a cloud computing–based facility and can be used in many
applications, e.g., behavior analysis, spam detection, data classification, and event prediction [123].
By using this API, users can crunch big multimedia data to predict results without having strong
programming skills and knowledge of machine-learning algorithms. While using this API, the
multimedia data need to be uploaded to Google cloud storage. Once the uploading is done, the
data are read using BigQuery. This API can be used in many applications of Internet of Things
(IoT) generating multimedia data, e.g., transportation management, surveillance, and healthcare.
Two popular examples are listed below.
• The Ford is a company that designs and sells vehicles. This API is used in the Ford’s labo-
ratories for research purposes. The main focus is on how to improve driving skills of their
clients by showing them maps of their daily routine routes. It also facilitates its clients to
save routes and location information. Once saved, the vehicle becomes smart vehicles and
can determine automatically where the driver wants to go. This decision can be made based
on driver’s driving routines at specific times and days of weeks. It can also help in analyzing
the behavior of drivers during driving [81].
• Pondera Solutions is a USA-based company to detect frauds. It uses the Google Prediction
API to address various government issues, e.g., fraud, abuse, and waste in different public
sectors [41].
3.1.4 Amazon API. It is another popular API to simplify thee processes of predictions, model
building, data filtering, and statistical analysis [94]. Machine-learning models offered by Amazon
deal with prediction problems only. Furthermore, the ratio of prediction error controls the speed
of processing big multimedia data. Many visualization tools are offered by this API to facilitate its
users to get better insight into the processed data. However, there are certain restrictions in terms
of user interface and representation learning algorithms. Nevertheless, it is user friendly and easy
to use and can be used for various tasks in IoT architectures, e.g., surveillance, transportation
management, and healthcare. Some examples are listed below.
• It can help to find the genre of a song by analyzing features of signal levels.
• It can help in recognizing human actions and activities from multimedia data. It can use
geo-location information from non-multimedia data to predict users’ activities.
• It can help to predict modes of payment (e.g., cash or card) by analyzing payments made in
the first week in any shopping center.
• It can help in detecting fake users and identities by analyzing web activities.
3.1.5 BigML. It is a user-friendly API and based on decision trees. It helps representation learn-
ing developers by making predictive analytics tasks easy and understandable. It also helps in un-
derstanding business requirements and analysis reports. This API offers three modes of operations,
i.e., RESTful, web interface, and command line interface, from which the web interface is the most
popular one [8, 126]. This API also supports real-time processing and data analysis. Some well-
known examples are listed below.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:10 M. Usman et al.
• It helps to build predictive models based on some past examples from similar datasets. There
is a support for batch processing jobs, i.e., designed models can process various data in-
stances in a batch to save the computational time. However, the accuracy of prediction
depends on the amount of provided data.
• It supports remote access to developed predictive models via the command line interface.
4.1 Datasets
The datasets play an important role in representation learning algorithms. It is very important to
have an understanding of datasets that can be used by different representation learning algorithms
to perform various tasks in the cybersecurity domain. In the following subsections, we discuss a
few datasets designed by well-known organizations for research purposes in the cybersecurity
domain. These datasets are summarized in Table 2.
4.1.1 DARPA Dataset. The Defense Advanced Research Projects Agency (DARPA) is a
well-known agency in the United States Department of Defense. Its main purpose is to focus
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:11
on developing technologies for military purposes [122]. In DARPA, there is a formal intrusion
detection evaluation group, known as the Cyber Systems and Technology Group (CSTG) of the
MIT Lincoln Laboratory that works under the sponsorship of the Defense Advanced Research
Projects agency and Air Force research laboratory. To evaluate a cybersecurity system designed
for computer networks, the CSTG made evaluation efforts in the years 1998 and 1999. The main
purpose of these efforts is to estimate rates of true and false alarms for all under evaluation
systems. The evaluations are designed to be simple, and the main focus is on core technology
issues. Another motive of these evaluations is to provide data types for cybersecurity systems.
There are many offline datasets available that can be used by researchers. These datasets contain
various examples of background data traffic and possible attacks. Two datasets were created
from DARPA’s intrusion detection evaluations in the years 1998 and 1999. Both datasets offer
offline and real-time evaluations. In the offline evaluation, the network traffic and audit logs are
processed in a batch mode to identify attacks during usual network activities. In the real-time
evaluation, the cybersecurity systems are inserted in a network testbed of the Air Force research
laboratory to identify attack sessions in normal network activities in real time. In the year 2000,
further experiments were conducted, and three additional datasets were created, known as 2000
scenario-specific datasets. Both scenarios include a Distributed Denial of Service (DDoS) attack
executed by an intruder. These scenarios contain various sessions of audit and network traffic.
In these sessions, a DDoS software is installed by an attacker on a compromised host to execute a
DDoS attack on a remote server. The only difference between these two scenarios is the difference
in the attacker’s role, i.e., the attacker in the second scenario is more stealthy than the attacker in
the first scenario. Mixed reviews are found on how useful this dataset can be to train a cyberse-
curity system in References [50, 128]. For example, a team of researchers conducted experiments
and found this dataset useful with Snort in Cisco intrusion detection systems in Reference [120].
However, recommendations were also made to make this dataset more real so that it can support
latest cybersecurity systems. However, there was another team of researchers who concluded that
Snort could not perform well due to limited information of attacks in this dataset in Reference
[12]. This team suggested that the performance of a cybersecurity system can be improved if this
dataset was combined with other datasets. Based on these mixed reviews, it can be concluded that
this dataset needs improvements and information of latest cyber-attacks needs to be included in it.
4.1.2 ADFA Dataset. The Australian Defence Force Academy (ADFA) cybersecurity datasets
contain data from Linux and Windows platforms [24]. These are designed to evaluate the perfor-
mance of Host-based Intrusion Detection Systems (HIDS). The HIDS can monitor and analyze the
internal environment of a computing system and incoming and outgoing network packets on its
network interfaces. These datasets are freely available for academic research. These datasets are
developed to better represent a compromised system from an initial behavior to a final compro-
mised response and set a more realistic benchmark to evaluate the performance of a cybersecurity
system. When designing these datasets, industry penetration testing methodologies were used and
a new attack framework was created as shown in Figure 2. This framework gives an understanding
to readers and users of this dataset on how a sample attack framework works and how this dataset
can be used to deal with different types of cyber-attacks. This framework explains a connection be-
tween link vulnerabilities and their effects starting by focusing on deployability phases and effects
of a particular attack. It provides a sample model to developers of cybersecurity systems to under-
stand the scope of a cybersecurity dataset and its coverage on various types of attacks. Different
layers of this framework, i.e., vulnerabilities, focus, accessibility, vector, deployability, and effect
chain, explain the entire idea of how an attack can happen and how to deal with it to stop possible
damages to an underlying network-based system. The main purpose of this sample framework is
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:12 M. Usman et al.
to modernize a cybersecurity system, plan a methodology based on current attack practices, use
current industrial testing methodologies, and design datasets that can be used to train a cyberse-
curity system. Researchers in the cybersecurity community started using this dataset soon after
its release. This dataset was used with a one-class SVM to detect intrusions in the cybersecurity
system in Reference [143]. However, it was found during experiments that this dataset was not
robust against all types of cyber-attacks. Another attempt was made to extract and analyze spe-
cific features from this dataset to build an adaptive cybersecurity system in References [131, 142].
This extraction and analysis of features showed an acceptable performance; however, it was not
suitable for modern complex cybersecurity systems. These references show that this dataset still
needs further improvements to match the requirements of current cybersecurity systems.
4.1.3 NetReSec pcap Files. The Network Forensics and Network Security Monitoring
(NetReSec) is an independent software vendor that focuses on network security [1]. This vendor
specializes in software for network forensics and analysis. This company maintains a pool of pcap
files and network traces that are freely available. This pool provides a useful resource to perform
network evaluations on a cybersecurity system. The provided pcap files and network traces are
classified into multiple categories, e.g., cyber defense exercises, malware traffics, network foren-
sics, and packet injection attacks. Contents of each category are captured from different resources
and can be used for various purposes. For example, the contents of cyber defense exercises include
network traffics from different resources for cyber-exercises and competitions. The contents of
malware traffic category are captured from honeypots [114], sandboxes [93] and real-world in-
trusions and can be used to analyze web-based malware attacks. In recent years, these pcap files
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:13
were used with different machine-learning algorithms, e.g., k-NN, SVM, and Bayesian networks,
to train cybersecurity systems to detect different types of attacks [48, 64, 115, 135]. The systems
showed good performances in the presence of specific attacks. However, the main purpose was
to analyze the performance of employed protocols, domain names, and communication patterns
in the presence of specific attacks in the underlying networks and a detailed analysis of modern
attacks was missing.
4.1.4 Cyber Research Center Datasets. The Cyber Research Center (CRC) from the United States
military academy offers datasets for public use in cybersecurity research [3]. These datasets pro-
vide a mean to match IP addresses from pcap files to IP addresses in internal networks. These
datasets are distributed into four categories, i.e., Snort intrusion detection logs, Domain Name
Service (DNS) logs, web server logs, and Splunk log server aggregate logs. The Snort are used to
analyze real-time network traffic along with logging of data packets. It is an open source system,
and its detection logs can be used to analyze network traffic to protect an underlying system from
malware attacks. The Snort gained popularity due to its accurate detection of threats at high speeds
and is considered as a suitable intrusion prevention technology worldwide. The DNS logs are dis-
tributed into two categories, i.e., external DNS service logs and message logs. The web server logs
are also distributed into two categories, i.e., Apache web server access logs and Apache web server
error logs. The Splunk is a security information and event management tool to analyze and aggre-
gate security logs from different applications and solutions in the deployed environment. Later,
the collected log records can be used to get an aggregated view and real-time monitoring of secu-
rity events within the monitored environment. These datasets were used to detect malware and
design efficient intrusion detection systems in References [86, 92, 104, 111]. The designed intrusion
detection systems were trained using CRC datasets and detected basic level of attacks; however,
they do not stand against modern attacks due to limited available information in these datasets.
4.1.5 Creation and Extension of Datasets with Packet Capturing Tools. Packet Capture Data,
formally known as pcap, is an application programming interface that captures network pack-
ets arriving at or transmitting from an Ethernet port. There are many packet capture libraries,
e.g., Libpcap and WinPCap [30], that can be used by various network analyzing tools to analyze
the behavior of and traffic generated by a network. Some very popular tools are WireShark [90],
Nmap [33], tcpdump [39], and NetFlow [35]. The Internet engineering task force has listed 144
IP addresses. This list includes many popular protocols, e.g., Internet control message protocol
[97], user datagram protocol [63], and transmission control protocol [10]. Applications and user
programs use these popular protocols to generate network packets to transmit data over the Inter-
net. Before transmission, an Ethernet frame is composed at the physical layer. This frame consists
of a header and a payload. The header contains a medium access control address and the pay-
load contains data that need to be transmitted. To transmit data over the Internet, the payload
must also contain an IP header. Some data or other encapsulated protocols may be encapsulated
in the IP payload. This entire Ethernet frame can be captured by pcap for further analysis and fea-
ture extraction. In the machine-learning domain, algorithms depend on the training and testing
datasets. These datasets are required to test the performance of designed systems and algorithms.
Although standard datasets are available to train machine-learning algorithms in the cybersecu-
rity domain, these datasets do not contain most updated data. Furthermore, it is not necessary
that these datasets may match the traffic generated by all types of networks. Each network has a
different size and deal with different types of nodes and applications. These applications generate
different types of network traffic including multimedia and non-multimedia data. The packet cap-
turing tools, e.g., pcap, WireShark, Nmap, tcpdump, and NetFlow, are needed to capture real-time
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:14 M. Usman et al.
network data generated by various applications running on a specific network. This captured data
can be used to train and test representation learning algorithms used in cybersecurity systems.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:15
platforms. However, these systems face various strong cyber-attacks, including Stuxnet and
computer numerical controlled milling attacks. In this survey, it is suggested through experiments
that representation learning algorithms, especially supervised dictionary learning algorithms,
can detect cyber-attacks with a high accuracy rate if physical data are studied properly. A survey
on industrial cyber-physical systems along with their attack detection and security control
mechanisms was presented in Reference [31]. This survey discusses DoS, deception, and replay
attacks along with their weaknesses. Furthermore, various developments on attack detection are
reviewed from a detection perspective. These developments can be utilized to develop supervised
dictionary learning algorithms to protect industrial cybersecurity systems.
Supervised dictionary learning models for intrusion detection were reviewed in Reference [70].
In this work, feature selection techniques are suggested to construct better adversary-aware classi-
fiers and a metric (i.e., model robustness score) is defined to evaluate relative resilience of different
models. A novel methodology based on supervised dictionary learning to automatically identify
integrity attacks was proposed for cybersecurity systems in Reference [89]. In this method, a fea-
ture set is designed to sense properties of integrity attacks to train dictionary learning algorithms.
Previously unseen attacks are also handled by adding a novelty detection component. A framework
based on semi-supervised dictionary learning was introduced to identify Sybil nodes in Reference
[43]. In this framework, a small set of authorized and Sybil nodes is taken from a social network of
nodes. Later, label information is propagated to remaining nodes to inform them about authorized
and Sybil nodes.
A technique based on dual graph constraints was proposed to design a low-ranked dictionary
learning algorithm for object classification systems in Reference [38]. In this technique, low-
dimensional space is used to train proposed dictionary learning algorithm to provide separability
between intra and inter-classes. This technique shows better performance on small-sized datasets
to classify objects and can be useful to detect malicious objects in cybersecurity systems. A similar
dictionary learning approach based on projection property to identify human beings in captured
videos was proposed in Reference [148]. In this approach, feature projection metrics are combined
with a set of dictionaries to classify labeled and unlabeled videos. Later, the labeled videos are used
to support learned dictionaries. The main purpose of this approach is person re-identification along
with detecting malicious activities in cybersecurity systems.
Artificial Neural Networks. Artificial Neural Networks (ANNs) are inspired from biological
neural networks to perform different tasks [107]. The tasks are performed through learning based
on provided examples. In the learning process, there are no specific rules. The ANNs consist of
various small units called artificial neurons where each neuron can communicate with other con-
nected neurons. The connections between neurons are called edges. The neurons and edges have
specific weights that increase or decrease as the learning process proceeds. Generally, the neurons
are distributed into multiple layers to perform different operations on input data. Nowadays, the
ANN is a standard and popular example in different domains of data processing, e.g., computer
vision, pattern recognition, speech processing, social networks, data classification, video games,
object tracking, big data analysis, and cybersecurity.
There are many variants of ANNs, e.g., Convolutional Neural Networks (CNNs), Recurrent Neu-
ral Networks (RNNs), Deep Belief Networks (DBNs), and so on. The CNNs consist of one or mul-
tiple convolutional layers, where each layer consists of multiple fully connected layers [72]. This
architecture is designed to process two-dimensional data and has many applications in the image
and audio processing domains. In the RNNs, the connections between nodes are sequential graphs
[44]. These networks are basically used to process sequential data and have applications in un-
segmented data analysis and speech recognition. The RNNs have two broad classes of networks
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:16 M. Usman et al.
called finite and infinite impulses. The finite impulse class is based on a directed acyclic graph
that can be unrolled. However, the infinite class possesses opposite features, i.e., it is based on a
directed cyclic graph and cannot be unrolled. The DBNs consist of multiple layers of hidden units
[74]. There are no connections between units within a layer, however, there are connections be-
tween layers. The DBNs can be used in both categories, i.e., supervised and unsupervised learning.
The DBN is a popular choice in many applications, e.g., pattern recognition, drug discovery, and
electroencephalography.
To secure networking, social computing, and cybersecurity systems, a risk assessment technique
based on a back-propagation neural network was proposed in Reference [78]. In this technique,
an improved cuckoo search algorithm is used to train the network to improve the accuracy and
stability in information security risk assessment processes in cybersecurity systems. A technique
based on ANNs was proposed to detect known and unknown DDoS attacks in References [21,
103]. In this technique, the DDoS attacks are detected based on specific patterns, and the main
purpose is to separate the traffic of DDoS attacks from genuine traffics in cybersecurity systems.
A multi-model-based framework was proposed to analyze observed data related to cyber-attacks
and make predictions about the progress of adversaries in Reference [95]. This framework consists
of multiple predictive models, i.e., a non-linear auto-regressive model, a non-linear auto-regressive
exogenous model, an auto-regressive neural network, and an auto-regressive integrated moving
average model, to make predictions about adversarial movements with a reliable accuracy.
A context information-based cybersecurity defense system was proposed to protect power sys-
tems in Reference [109]. In this system, a vicious fault in an underlying local area network is
identified by analyzing context information. Measurements are fed into a probabilistic neural net-
work to predict the fault. An ensemble modeling–based approach to detect integrity attacks in
cybersecurity systems was proposed in Reference [88]. This approach is a combination of an ANN
and a linear time-invariant modeling and is tested against different integrity attacks with varying
intensity levels.
A reservoir computing architecture based on neuromorphic computing was proposed to detect
anomalies in cybersecurity systems in Reference [77]. The architecture is proposed for feedback-
based systems and its application is introduced in smart grids for anomaly detection. Another
similar architecture to detect anomalies in automobiles was proposed in Reference [119]. In this
architecture, multivariate Markov chains are combined with RNNs to create anomaly detectors for
automotive cyber-attacks.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:17
clustering approach was proposed to deal with cyber-activities including reconnaissance and
corporate cyber scanning activities in Reference [11]. In this approach, datasets consist of real
network traffic are used in two experimental environments to test the performance against
unsupervised k-means clustering and expectation maximization approaches.
Principal Component Analysis. Principal Component Analysis (PCA) is a procedure to con-
vert a set of observations to a set of linearly uncorrelated variables called principal components
[65]. In converted principal components, the largest possible variance is held by the first compo-
nent and each succeeding component holds the highest variance value. The PCA is the simplest
form of eigen vector–based analysis and is used as a tool to analyze data and make predictive
models. The PCA is quite popular in neuroscience and quantitative finance fields.
Various surveys on cybersecurity systems, fourth and fifth generation cellular networks, and
smart power grids, were presented to discuss authentication and privacy-preservation against dif-
ferent cyber-attacks in References [36, 46, 139], respectively. These surveys highlight different
frameworks and machine-learning tools for data analysis and future research directions, e.g., how
to design and model different types of attacks, design strategies for various attacks through risk
assessments, and design testbeds to validate security issues and solutions.
An approach based on distributed SVMs was proposed to detect the injection of stealthy false
data in smart grids in Reference [34]. This approach uses PCA to minimize data dimensions that
may cause computational complexities during data processing. A real-time algorithm was pro-
posed to detect abnormal changes in power networks data stored in accessible databases in Refer-
ence [133]. In this algorithm, the PCA is used to monitor power flow results and identify abnormal
input data modified by cyber-attacks.
A distributed blind intrusion detection framework was proposed for cybersecurity systems in
[102]. In this framework, a PCA-based approach is used to detect intrusions by analyzing sen-
sor measurements and statistical properties of graph-signals. To detect anomalies in large-scale
networks, a technique based on geometric area analysis was proposed in Reference [84]. This
technique is based on trapezoidal area estimation to observe computed parameters, and dimen-
sions of network data are reduced by the PCA. An inference-based intrusion detection approach
was proposed to identify cyber-attacks in software-defined networks in Reference [4]. In this ap-
proach, regularly labeled flows generated by software-defined networks are analyzed to identify
cyber-attacks and dimensions of data are reduced by the PCA.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:18 M. Usman et al.
techniques including RBMs are discussed to analyze big data for computational intelligence along
with recent advancements and applications.
Various recent developments using machine-learning methods in software-defined networks
were reviewed to implement intrusion detection systems for cybersecurity applications in Refer-
ence [116]. This study focuses on deep learning techniques including RBMs and tools that can be
used to design intrusion detection systems for software-defined networks. Various deep learning
methodologies, e.g., RNNs, deep neural network, and RBMs-based DBNs, were reviewed in Refer-
ence [73]. In this study, various deep learning methodologies along with other machine-learning
techniques are discussed from a network anomaly detection perspective. Experiments are also
conducted to check the compatibility of deep learning methodologies to analyze network traffic.
A heterogeneous deep learning framework was proposed to intelligently detect malware in net-
work traffic in Reference [146]. This heterogeneous framework consists of an autoencoder, multi-
layered RBMs, and associative memory layers to identify unknown malware. A linear approach
was proposed to increase the productivity of predictive manufacturing systems along with re-
silience and interoperability features in Reference [76]. In this approach, features are extracted
through an RBM. Performances of prediction processes are also improved through the same RBM
by building an intelligent manufacturing system to automatically predict and reconfigure faulty
events.
Autoencoder. An autoencoder is based on an ANN and operates in an unsupervised way to
learn efficient data coding [134]. It is used to learn representations of input data for compression
purposes. The compression is applied by reducing the dimensions of supplied data. The input data
are transformed into a short code that is later uncompressed to match the original input data. The
autoencoders can be used in a stacked form in certain applications, e.g., image recognition. In the
stacked format, the lower layers learn and encode easy features while the upper layers analyze the
output of previous layers and encode missing, difficult, or hidden features. This process continues
until the entire data are encoded.
An improved extreme learning machine framework was proposed for smart grids to detect false
data attacks in Reference [144]. This framework uses an autoencoder to minimize the dimensions
of measured data and is tested to effectively detect unobservable attacks. A deep learning–based
approach was proposed to detect distributed attacks in social IoT in Reference [32]. In this ap-
proach, an autoencoder is used to discover hidden patterns from training data to distinguish attacks
from benign traffic. This approach performs well against centralized attack detection approaches.
A framework was proposed to detect impersonation attacks in Wi-Fi signals in IoT in Reference
[6]. In this framework, a stacked autoencoding is used to provide meaningful representations from
a well-referenced Wi-Fi dataset, i.e., Aegean Wi-Fi intrusion dataset. A robust sensitivity-based
learning algorithm was proposed to detect evasion attacks on classifiers in Reference [18]. This
algorithm is based on a modified stacked autoencoder and performs better against conventionally
stacked and denoising autoencoders in terms of time complexity.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:19
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:20 M. Usman et al.
• In daily life applications, e.g., healthcare, transportation management, cloud data manage-
ment, and person identification, the representation learning algorithms can be trained once
in a while and used for a long time without a retraining. The training time is usually quite
long. However, real-time cybersecurity applications require frequent training of these al-
gorithms and the availability of updated datasets, and as a result, most of these algorithms
might not be suitable for real-time cybersecurity applications.
• Frequent training might be required on a daily basis or more than once a week due to rapidly
changing nature and features of cyber-attacks. Whenever a new attack is identified and its
features and patterns become known, a retraining is required. The representation learning
algorithms usually train from scratch and require many days to finish the training process.
Such a long training process wastes time and computational and storage resources if small
changes are required to be made on a daily basis.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:21
• Existing representation learning algorithms are quite complex and might not support real-
time processing.
• Cost becomes another challenge when executing and managing existing representation
learning algorithms.
• Existing algorithms are basically designed for specific applications, e.g., pattern recognition,
computer vision, and image and signal processing. Using these algorithms for cybersecurity
applications require significant changes.
• Due to the complexity of these algorithms and the availability of cheap resources, most of
these algorithms are executing on public cloud platforms. Although cloud service providers
ensure best effort services, still their platforms cannot be fully trusted. Granting access to
applications running on public cloud platforms to access sensitive data can open doors for
intruders. Furthermore, the data travel over public networks, i.e., the Internet, and as a
result, the privacy can easily be compromised.
• Most organizations do not have sufficient budget to purchase expensive cybersecurity sys-
tems and applications. Furthermore, some organizations might be dealing with real-time
data and applications. To propose cost-effective and real-time cybersecurity systems based
on representation learning algorithms, researchers and developers need to use or develop
representation learning algorithms that must require less time and computational resources
to finish the training process.
• In certain research domains, e.g., healthcare, transportation management, cloud data man-
agement, and person identification, it is easy to obtain training and testing datasets. There
are many datasets that are publicly available. However, in the cybersecurity domain, the
availability of most recent training and testing data is not easy. Furthermore, the organi-
zations do not prefer to share their network traffic to external users and researchers, as it
may contain sensitive information and records. In this situation, there is a need to develop
lightweight representation learning algorithms that can be trained locally.
• Due to the continuously changing nature of cyber-attacks, it is very important to have
authentic and versatile data from different resources (e.g., different cybersecurity systems)
for training and testing purposes. Global organizations discussed in Section 2.2 can offer
their help and share resources. However, there is a need for joint collaborations between
different organizations on a local level.
• To produce accurate results, the representation learning algorithms need to use huge vol-
umes of data for training and testing purposes. Real-time cybersecurity applications gener-
ate huge volumes of data on daily bases. These data need to be labeled properly if supervised
or semi-supervised algorithms are used. To increase the accuracy ratio, correct data labeling
is the preliminary step. In the cybersecurity domain, chances of the availability of labeled
data are very low and labeling of large volumes of data requires lots of computational and
human resources. Therefore, there is a need for representation learning algorithms that can
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:22 M. Usman et al.
automatically label huge volumes of data in real time without requiring extra computational
resources.
6 CONCLUSION
Representation learning is a sub-domain of machine learning that allows automatic discovery of
features from raw input data to perform data classification and analysis. In machine-learning tasks,
data classification requires mathematically and computationally convenient input data. However,
real-time multimedia and non-multimedia data, e.g., images, audio, videos, and sensor data, do
not define specific features. The representation learning techniques offer an alternative by discov-
ering features or representations through examination without relying on explicit algorithms. In
this survey, we have discussed various cyber-attacks and initiatives taken by international organi-
zations. In the cybersecurity domain, real-time applications deal with both multimedia and non-
multimedia data. To process the data produced by various real-time applications, we have provided
an in-depth overview of various representation learning computing platforms. These computing
platforms are introduced by well-known vendors, e.g., IBM, Microsoft, Google, Amazon and Big
ML. We have also discussed various datasets that can be utilized by representation learning algo-
rithms in the cybersecurity domain. Later, we have discussed and summarized recent efforts made
for cybersecurity systems by using representation learning algorithms. These efforts are classified
into three broad categories, i.e., supervised, unsupervised, and deep architectures. In the end, we
highlight various limitations in the available datasets and existing representation learning–based
techniques. The main purpose of highlighting the limitations is to tell the researchers and devel-
opers that there are still many open research challenges that need to be addressed when using
the available datasets and techniques. These limitations also highlight various future research di-
rections. These research directions highlight various facts that need to be considered to improve
various features of available representation learning techniques to make them compatible with
real-time applications.
REFERENCES
[1] 2018. Network Forensics and Network Security Monitoring (Netresec). Retrieved from http://www.netresec.com/
?page=AboutNetresec.
[2] Abebe Abeshu and Naveen Chilamkurti. 2018. Deep learning: The frontier for distributed attack detection in fog-
to-things computing. IEEE Commun. Mag. 56, 2 (2018), 169–175.
[3] United States Military Academy. 2018. Cyber Research Center. Retrieved from https://www.usma.edu/crc/SitePages/
Home.aspx.
[4] Ahmed AlEroud and Izzat Alsmadi. 2017. Identifying cyber-attacks on software defined networks: An inference-
based intrusion detection approach. J. Netw. Comput. Appl. 80 (2017), 152–164.
[5] Riham AlTawy and Amr M. Youssef. 2016. Security tradeoffs in cyber physical systems: A case study survey on
implantable medical devices. IEEE Access 4 (2016), 959–979.
[6] Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, and Kwangjo Kim. 2018. Deep
abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans. Inf. Forens. Secur. 13, 3
(2018), 621–636.
[7] Haiyong Bao, Rongxing Lu, Beibei Li, and Ruilong Deng. 2016. BLITHE: Behavior rule-based insider threat detection
for smart grid. IEEE Iof T J. 3, 2 (2016), 190–205.
[8] Cristóbal Barba-González, José García-Nieto, María del Mar Roldán-García, Ismael Navas-Delgado, Antonio J. Nebro,
and José F. Aldana-Montes. 2019. BIGOWL: Knowledge centered big data analytics. Expert Syst. Appl. 115 (2019),
543–556.
[9] Roger Barga, Valentine Fontama, Wee Hyong Tok, and Luis Cabrera-Cordon. 2015. Predictive Analytics with Microsoft
Azure Machine Learning. Springer.
[10] Miguel Barreiros and Peter Lundqvist. 2015. QoS-Enabled Networks: Tools and Foundations. John Wiley & Sons.
[11] Elias Bou-Harb, Mourad Debbabi, and Chadi Assi. 2013. A systematic approach for detecting and clustering dis-
tributed cyber scanning. Comput. Netw. 57, 18 (2013), 3826–3839.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:23
[12] S. Terry Brugger and Jedidiah Chow. 2007. An assessment of the DARPA IDS evaluation dataset using Snort. UC-
DAVIS Department of Computer Science 1, 2007 (2007), 22.
[13] Anna L. Buczak and Erhan Guven. 2016. A survey of data mining and machine learning methods for cyber security
intrusion detection. IEEE Commun. Surv. Tutor. 18, 2 (2016), 1153–1176.
[14] Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos. 2012. Modeling security in cyber–physical sys-
tems. Int. J. Crit. Infrastr. Protect. 5, 3–4 (2012), 118–126.
[15] Xingjuan Cai, Yun Niu, Shaojin Geng, Jiangjian Zhang, Zhihua Cui, Jianwei Li, and Jinjun Chen. 2019. An under-
sampled software defect prediction method based on hybrid multi-objective cuckoo search. Concurrency and Com-
putation: Practice and Experience (2019). DOI:https://doi.org/10.1002/cpe.5478
[16] Xingjuan Cai, Penghong Wang, Lei Du, Zhihua Cui, Wensheng Zhang, and Jinjun Chen. 2019. Multi-objective
3-dimensional DV-hop localization algorithm with NSGA-II. IEEE Sens. J. (2019). DOI:https://doi.org/10.1109/JSEN.
2019.2927733
[17] Francesco Camastra, Angelo Ciaramella, and Antonino Staiano. 2013. Machine learning and soft computing for ICT
security: An overview of current trends. J. Amb. Intell. Human. Comput. 4, 2 (2013), 235–247.
[18] Patrick P. K. Chan, Zhe Lin, Xian Hu, Eric C. C. Tsang, and Daniel S. Yeung. 2017. Sensitivity based robust learning
for stacked autoencoder against evasion attack. Neurocomputing 267 (2017), 572–580.
[19] Brijesh Kashyap Chejerla and Sanjay K. Madria. 2017. QoS guaranteeing robust scheduling in attack resilient cloud
integrated cyber physical system. Fut. Gener. Comput. Syst. 75 (2017), 145–157.
[20] Ping Chen, Lieven Desmet, and Christophe Huygens. 2014. A study on advanced persistent threats. In Proceedings
of the IFIP International Conference on Communications and Multimedia Security. Springer, 63–72.
[21] Sujit Rokka Chhetri, Arquimedes Canedo, and Mohammad Abdullah Al Faruque. 2016. Kcad: Kinetic cyber-attack
detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Con-
ference on Computer-Aided Design. ACM, 74.
[22] Chris Clifton and Tamir Tassa. 2013. On syntactic anonymity and differential privacy. In Proceedings of the IEEE 29th
International Conference on Data Engineering Workshops (ICDEW’13). IEEE, 88–93.
[23] Gideon Creech. 2014. Developing a High-accuracy Cross Platform Host-Based Intrusion Detection System Capable of
Reliably Detecting Zero-day Attacks. Ph.D. Dissertation. University of New South Wales, Canberra, Australia.
[24] Gideon Creech and Jiankun Hu. 2013. Generation of a new IDS test dataset: Time to retire the KDD collection. In
Proceedings of the Wireless Communications and Networking Conference (WCNC), 2013 IEEE. IEEE, 4487–4492.
[25] Zhihua Cui, Yang Cao, Xingjuan Cai, Jianghui Cai, and Jinjun Chen. 2019. Optimal LEACH protocol with modified
bat algorithm for big data sensing systems in Internet of Things. J. Parallel and Distrib. Comput. 132 (2019), 217–229.
DOI:https://doi.org/10.1016/j.jpdc.2017.12.014
[26] Zhihua Cui, Bin Sun, Gaige Wang, Yu Xue, and Jinjun Chen. 2017. A novel oriented cuckoo search algorithm
to improve DV-Hop performance for cyber–physical systems. J. Parallel and Distrib. Comput. 103 (2017), 42–52.
DOI:https://doi.org/10.1016/j.jpdc.2016.10.011
[27] Zhihua Cui, Fei Xue, Xingjuan Cai, Yang Cao, Gai-ge Wang, and Jinjun Chen. 2018. Detection of malicious
code variants based on deep learning. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3187–3196. DOI:
https://doi.org/10.1109/TII.2018.2822680
[28] Zhihua Cui, Jiangjiang Zhang, Yechuang Wang, Yang Cao, Xingjuan Cai, Wensheng Zhang, and Jinjun Chen. 2019.
A pigeon-inspired optimization algorithm for many-objective optimization problems. Sci. China Inf. Sci 62 (2019),
070212. DOI:https://doi.org/10.1007/s11432-018-9729-5
[29] Kristopher Daley, Ryan Larson, and Jerald Dawkins. 2002. A structural framework for modeling multi-stage network
attacks. In Proceedings of the International Conference on Parallel Processing Workshops, 2002. IEEE, 5–10.
[30] Luca Deri et al. 2004. Improving passive packet capture: Beyond device polling. In Proceedings of the SANE, Vol. 2004.
Amsterdam, Netherlands, 85–93.
[31] Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, and Xian-Ming Zhang. 2018. A survey on security control
and attack detection for industrial cyber-physical systems. Neurocomputing 275 (2018), 1674–1683.
[32] Abebe Abeshu Diro and Naveen Chilamkurti. 2017. Distributed attack detection scheme using deep learning ap-
proach for Internet of Things. Fut. Gener. Comput. Syst. 82 (2017), 761–768.
[33] Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast internet-wide scanning and its security
applications. In Proceedings of the USENIX Security Symposium, Vol. 8. 47–53.
[34] Mohammad Esmalifalak, Lanchao Liu, Nam Nguyen, Rong Zheng, and Zhu Han. 2014. Detecting stealthy false data
injection using machine learning in smart grid. IEEE Syst. J. 11, 3 (2014), 1644–1652.
[35] Cristian Estan, Ken Keys, David Moore, and George Varghese. 2004. Building a better NetFlow. In Proceedings of the
ACM SIGCOMM Computer Communication Review, Vol. 34. ACM, 245–256.
[36] Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, and Helge Janicke. 2017.
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl. 101 (2017), 55–82.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:24 M. Usman et al.
[37] Prahlad Fogla, Monirul I. Sharif, Roberto Perdisci, Oleg M. Kolesnikov, and Wenke Lee. 2006. Polymorphic blending
attacks. In Proceedings of the USENIX Security Symposium. 241–256.
[38] Homa Foroughi, Nilanjan Ray, and Hong Zhang. 2018. Object classification with joint projection and low-rank
dictionary learning. IEEE Trans. Image Process. 27, 2 (2018), 806–821.
[39] Felix Fuentes and Dulal C. Kar. 2005. Ethereal vs. Tcpdump: A comparative study on packet sniffing tools for edu-
cational purpose. J. Comput. Sci. Coll. 20, 4 (2005), 169–176.
[40] Robin Gandhi, Anup Sharma, William Mahoney, William Sousan, Qiuming Zhu, and Phillip Laplante. 2011. Dimen-
sions of cyber-attacks: Cultural, social, economic, and political. IEEE Technol. Soc. Mag. 30, 1 (2011), 28–38.
[41] Gigaom. 2013. This Is Interesting: A Fraud-Detection Company Built on Google’s Prediction API. Retrieved from
https://gigaom.com/2013/07/31/this-is-interesting-a-fraud-detection-company-built-on-googles-prediction-api/.
[42] Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos, and Murat Kantarcioglu. 2017. Security and
privacy in cyber-physical systems: A survey of surveys. IEEE Des. Test 34, 4 (2017), 7–17.
[43] Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. Sybilbelief: A semi-supervised learning approach for
structure-based sybil detection. IEEE Trans. Inf. Forens. Secur. 9, 6 (2014), 976–987.
[44] Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural
networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’13).
IEEE, 6645–6649.
[45] Tim Greene. 2015. Biggest data breaches of 2015. Network 10 (2015), 14.
[46] B. B. Gupta and Tafseer Akhtar. 2017. A survey on smart power grid: Frameworks, tools, security issues, and solu-
tions. Ann. Telecommun. 72, 9–10 (2017), 517–549.
[47] Didem Gürdür and Fredrik Asplund. 2017. A systematic review to merge discourses: Interoperability, integration
and cyber-physical systems. J. Industr. Inf. Integr. 9 (2017), 14–23.
[48] Fariba Haddadi, Duc Le Cong, Laura Porter, and A. Nur Zincir-Heywood. 2015. On the effectiveness of different
botnet detection approaches. In Information Security Practice and Experience. Springer, 121–135.
[49] Adam Hahn, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. 2013. Cyber-physical security testbeds:
Architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 4, 2 (2013), 847–855.
[50] Tarfa Hamed, Jason B. Ernst, and Stefan C. Kremer. 2018. A survey and taxonomy on data and pre-processing
techniques of intrusion detection systems. In Computer and Network Security Essentials. Springer, 113–134.
[51] Simon Hansman and Ray Hunt. 2005. A taxonomy of network and computer attacks. Comput. Secur. 24, 1 (2005),
31–43.
[52] Muneeb Ul Hassan, Mubashir Husain Rehmani, Ramamohanarao Kotagiri, Jiekui Zhang, and Jinjun Chen. 2019.
Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 131 (2019),
69–80.
[53] Haibo He and Jun Yan. 2016. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Phys. Syst.:
Theory Appl. 1, 1 (2016), 13–27.
[54] Ryan Heartfield and George Loukas. 2016. A taxonomy of attacks and a survey of defence mechanisms for semantic
social engineering attacks. ACM Comput. Surv. 48, 3 (2016), 37.
[55] Ryan Heartfield, George Loukas, and Diane Gan. 2016. You are probably not the weakest link: Towards practical
prediction of susceptibility to semantic social engineering attacks. IEEE Access 4 (2016), 6910–6928.
[56] Geoffrey E. Hinton. 2012. A practical guide to training restricted Boltzmann machines. In Neural Networks: Tricks of
the Trade. Springer, 599–619.
[57] Geoffrey E. Hinton and Terrence Joseph Sejnowski. 1999. Unsupervised Learning: Foundations of Neural Computation.
MIT Press.
[58] Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling, et al. 2008. Measurements and mitiga-
tion of peer-to-peer-based botnets: A case study on storm worm. Large-Scale Exploits and Emergent Threats (LEET)
8, 1 (2008), 1–9.
[59] Fei Hu, Yu Lu, Athanasios V. Vasilakos, Qi Hao, Rui Ma, Yogendra Patil, Ting Zhang, Jiang Lu, Xin Li, and Neal
N. Xiong. 2016. Robust cyber–physical systems: Concept, models, and implementation. Fut. Gener. Comput. Syst. 56
(2016), 449–475.
[60] Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo, and Jeffrey Voas. 2015. Attribute-based access control. Computer
48, 2 (2015), 85–88.
[61] Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security: A survey. IEEE
IoT J. 4, 6 (2017), 1802–1831.
[62] Rahat Iqbal, Faiyaz Doctor, Brian More, Shahid Mahmud, and Usman Yousuf. 2017. Big data analytics and computa-
tional intelligence for cyber–physical systems: Recent trends and state of the art applications. Fut. Gener. Comput.
Syst. (2017).
[63] Stuart Jacobs. 2011. Engineering Information Security: The Application of Systems Engineering Concepts to Achieve
Information Assurance. Vol. 14. John Wiley & Sons.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:25
[64] Mian Ahmad Jan, Muhammad Usman, Xiangjian He, and Ateeq Ur Rehman. 2018. SAMS: A seamless and authorized
multimedia streaming framework for WMSN-based IoMT. IEEE IoT J. 6, 2 (2018), 1576–15783.
[65] Ian Jolliffe. 2011. Principal component analysis. In International Encyclopedia of Statistical Science. Springer, 1094–
1096.
[66] Klaus Julisch. 2013. Understanding and overcoming cyber security anti-patterns. Comput. Netw. 57, 10 (2013), 2206–
2211.
[67] Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, and Angela Y. Wu.
2002. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell.
7 (2002), 881–892.
[68] Da-Yu Kao and Shou-Ching Hsiao. 2018. The dynamic analysis of WannaCry ransomware. In Proceedings of the 20th
International Conference on Advanced Communication Technology (ICACT’18). IEEE, 159–166.
[69] Stamatis Karnouskos. 2011. Stuxnet worm impact on industrial cyber-physical system security. In Proceedings of the
37th Annual Conference on IEEE Industrial Electronics Society (IECON’11). IEEE, 4490–4494.
[70] Ziv Katzir and Yuval Elovici. 2018. Quantifying the resilience of machine learning classifiers used for cyber security.
Expert Syst. Appl. 92 (2018), 419–429.
[71] Ratinder Kaur and Maninder Singh. 2014. A survey on zero-day polymorphic worm detection techniques. IEEE
Commun. Surv. Tutor. 16, 3 (2014), 1520–1549.
[72] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. Imagenet classification with deep convolutional
neural networks. In Advances in Neural Information Processing Systems. 1097–1105.
[73] Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, and Kuinam J. Kim. 2017. A survey of deep
learning-based network anomaly detection. Cluster Comput. 22, 1 (2017), 1–13.
[74] Nicolas Le Roux and Yoshua Bengio. 2008. Representational power of restricted Boltzmann machines and deep belief
networks. Neur. Comput. 20, 6 (2008), 1631–1649.
[75] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436–444.
[76] Jay Lee, Chao Jin, and Behrad Bagheri. 2017. Cyber physical systems for predictive production systems. Prod. Eng.
11, 2 (2017), 155–165.
[77] Jialing Li, Lingjia Liu, Chenyuan Zhao, Kian Hamedani, Rachad Atat, and Yang Yi. 2017. Enabling sustainable cyber
physical security systems through neuromorphic computing. IEEE Trans. Sust. Comput. 3, 2 (2017), 112–125.
[78] Senyu Li, Fangming Bi, Wei Chen, Xuzhi Miao, Jin Liu, and Chaogang Tang. 2018. An improved information security
risk assessments method for cyber-physical-social computing and networking. IEEE Access 6 (2018), 10311–10319.
[79] Yinghua Li, He Yu, Bin Song, and Jinjun Chen. 2019. Image encryption based on a single-round dictionary and
chaotic sequences in cloud computing. Concurr. Comput.: Pract. Exper. (2019). DOI:https://doi.org/10.1002/cpe.5182
[80] Kevin Liao, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn. 2016. Behind closed doors: Measurement and analysis of
CryptoLocker ransoms in Bitcoin. In Proceedings of the APWG Symposium on Electronic Crime Research (eCrime’16).
IEEE, 1–13.
[81] WIRED Magazine. 2011. FORD, Google team up to make smarter cars. Retrieved from https://www.wired.com/2011/
05/ford-google-prediction-api/.
[82] Gary Miliefsky. 2008. Proactive network security system to protect against hackers. U.S. Patent 7,346,922.
[83] Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2012. Foundations of Machine Learning. MIT Press.
[84] Nour Moustafa, Jill Slay, and Gideon Creech. 2017. Novel geometric area analysis technique for anomaly detection
using trapezoidal area estimation on large-scale networks. IEEE Trans. Big Data (2017).
[85] Maryam M. Najafabadi, Flavio Villanustre, Taghi M. Khoshgoftaar, Naeem Seliya, Randall Wald, and Edin
Muharemagic. 2015. Deep learning applications and challenges in big data analytics. J. Big Data 2, 1 (2015), 1.
[86] E. Allison Newcomb, Robert J. Hammell, and Steve Hutchinson. 2016. Effective prioritization of network intrusion
alerts to enhance situational awareness. In Proceedings of the IEEE Conference on Intelligence and Security Informatics
(ISI’16). IEEE, 73–78.
[87] Hironori Nishikaze, Seiichi Ozawa, Jun Kitazono, Tao Ban, Junji Nakazato, and Jumpei Shimamura. 2015. Large-scale
monitoring for cyber attacks by using cluster information on darknet traffic features. Proc. Comput. Sci. 53 (2015),
175–182.
[88] Stavros Ntalampiras. 2015. Detection of integrity attacks in cyber-physical critical infrastructures using ensemble
modeling. IEEE Trans. Industr. Inf. 11, 1 (2015), 104–111.
[89] Stavros Ntalampiras. 2016. Automatic identification of integrity attacks in cyber-physical systems. Expert Syst. Appl.
58 (2016), 164–173.
[90] Angela Orebaugh, Gilbert Ramirez, and Jay Beale. 2006. Wireshark & Ethereal Network Protocol Analyzer Toolkit.
Elsevier.
[91] Hamed Orojloo and Mohammad Abdollahi Azgomi. 2017. A method for evaluating the consequence propagation of
security attacks in cyber–physical systems. Fut. Gener. Comput. Syst. 67 (2017), 57–71.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:26 M. Usman et al.
[92] Ramkumar Paranthaman and Bhavani Thuraisingham. 2017. Malware collection and analysis. In Proceedings of the
IEEE International Conference on Information Reuse and Integration (IRI’17). IEEE, 26–31.
[93] Sebastien Pouliot. 2010. System and method for using sandboxes in a managed shell. U.S. Patent 7,725,922.
[94] Abhilasha Singh Rathor, Amit Agarwal, and Preeti Dimri. 2018. Comparative study of machine learning approaches
for Amazon reviews. Proc. Comput. Sci. 132 (2018), 1552–1561.
[95] Aunshul Rege, Zoran Obradovic, Nima Asadi, and Edward Parker. 2018. Predicting adversarial cyber intrusion stages
using autoregressive neural networks. IEEE Intell. Syst. 33, 2 (2018), 29–39.
[96] Zahoor-Ur Rehman, Sidra Nasim Khan, Khan Muhammad, Jong Weon Lee, Zhihan Lv, Sung Wook Baik, Peer Azmat
Shah, Khalid Awan, and Irfan Mehmood. 2017. Machine learning-assisted signature and heuristic-based detection
of malwares in Android devices. Computers & Electrical Engineering 132 (2017).
[97] Rami Rosen. 2014. Internet control message protocol (ICMP). In Linux Kernel Networking. Springer, 37–61.
[98] Jitendra Kumar Rout, Anmol Dalmia, Kim-Kwang Raymond Choo, Sambit Bakshi, and Sanjay Kumar Jena. 2017.
Revisiting semi-supervised learning for online deceptive review detection. IEEE Access 5, 1 (2017), 1319–1327.
[99] Robin Ruefle, Audrey Dorofee, David Mundie, Allen D. Householder, Michael Murray, and Samuel J. Perl. 2014.
Computer security incident response team development and evolution. IEEE Secur. Priv. 12, 5 (2014), 16–26.
[100] Jukka Ruohonen, Sami Hyrynsalmi, and Ville Leppänen. 2016. An outlook on the institutional evolution of the
European Union cyber security apparatus. Gov. Inf. Quart. 33, 4 (2016), 746–756.
[101] Nasser R. Sabar, Xun Yi, and Andy Song. 2018. A bi-objective hyper-heuristic support vector machines for big data
cyber-security. IEEE Access 6 (2018), 10421–10431.
[102] Hamidreza Sadreazami, Arash Mohammadi, Amir Asif, and Konstantinos N. Plataniotis. 2017. Distributed graph-
based statistical approach for intrusion detection in cyber-physical systems. IEEE Trans. Sign. Inf. Process. Netw. 4, 1
(2017), 137–147.
[103] Alan Saied, Richard E. Overill, and Tomasz Radzik. 2016. Detection of known and unknown DDoS attacks using
artificial neural networks. Neurocomputing 172 (2016), 385–393.
[104] Benjamin Sangster, T. J. O’Connor, Thomas Cook, Robert Fanelli, Erik Dean, Christopher Morrell, and Gregory
J. Conti. 2009. Toward instrumenting network warfare competitions to generate labeled datasets. In Proceedings of
the USENIX Workshop on Cyber Security Experimentation and Test (CSET’09).
[105] Andrea Saracino, Daniele Sgandurra, Gianluca Dini, and Fabio Martinelli. 2016. Madam: Effective and efficient
behavior-based android malware detection and prevention. IEEE Trans. Depend. Sec. Comput. 15, 1 (2016), 83–97.
[106] Nolen Scaife, Henry Carter, Patrick Traynor, and Kevin R. B. Butler. 2016. Cryptolock (and drop it): Stopping ran-
somware attacks on user data. In Proceedings of the IEEE 36th International Conference on Distributed Computing
Systems (ICDCS’16). IEEE, 303–312.
[107] Robert J. Schalkoff. 1997. Artificial Neural Networks. Vol. 1. McGraw–Hill, New York.
[108] Mischa Schmidt and Christer Åhlund. 2018. Smart buildings as cyber-physical systems: Data-driven predictive con-
trol strategies for energy efficiency. Renew. Sust. Energy Rev. 90 (2018), 742–756.
[109] Su Sheng, W. L. Chan, K. K. Li, Duan Xianzhong, and Zeng Xiangjun. 2007. Context information-based cyber security
defense of protection system. IEEE Trans. Power Deliv. 22, 3 (2007), 1477–1481.
[110] Peter W. Singer and Allan Friedman. 2014. Cybersecurity: What Everyone Needs to Know. Oxford University Press,
Oxford, UK.
[111] Sidney C. Smith, Robert J. Hammell, Kin W. Wong, and Carlos J. Mateo. 2016. An experimental exploration of the
impact of host-level packet loss on network intrusion detection. In Proceedings of the Cybersecurity Symposium
(CYBERSEC’16). IEEE, 13–19.
[112] Houbing Song, Glenn A. Fink, and Sabina Jeschke. 2017. Security and Privacy in Cyber-physical Systems: Foundations,
Principles, and Applications. John Wiley & Sons.
[113] Aditya K. Sood and Richard J. Enbody. 2013. Targeted cyberattacks: A superset of advanced persistent threats. IEEE
Secur. Priv. 11, 1 (2013), 54–61.
[114] Lance Spitzner. 2003. Honeypots: Tracking Hackers. Vol. 1. Addison-Wesley, Reading, MA.
[115] V. Srihari and R. Anitha. 2014. DDoS detection system using wavelet features and semi-supervised learning. In
Proceedings of the International Symposium on Security in Computing and Communication. Springer, 291–303.
[116] Nasrin Sultana, Naveen Chilamkurti, Wei Peng, and Rabei Alhadad. 2018. Survey on SDN based network intrusion
detection system using machine learning approaches. Peer-to-Peer Networking and Applications 12, 2 (2018), 1–9.
[117] Paweł Szynkiewicz and Adam Kozakiewicz. 2017. Design and evaluation of a system for network threat signatures
generation. J. Comput. Sci. 22 (2017), 187–197.
[118] Wei Tan, Yushun Fan, Ahmed Ghoneim, M. Anwar Hossain, and Schahram Dustdar. 2016. From the service-oriented
architecture to the web API economy. IEEE Internet Comput. 20, 4 (2016), 64–68.
[119] Adrian Taylor, Sylvain Leblanc, and Nathalie Japkowicz. 2018. Probing the limits of anomaly detectors for automo-
biles with a cyber attack framework. IEEE Intell. Syst. 33, 2 (2018), 54–62.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
A Survey on Representation Learning Efforts in Cybersecurity Domain 111:27
[120] Ciza Thomas, Vishwas Sharma, and N. Balakrishnan. 2008. Usefulness of DARPA dataset for intrusion detection
system evaluation. In Proceedings of the Conference on Data Mining, Intrusion Detection, Information Assurance, and
Data Networks Security 2008, Vol. 6973. International Society for Optics and Photonics, 69730G.
[121] Olivier Thonnard, Leyla Bilge, Gavin O’Gorman, Seán Kiernan, and Martin Lee. 2012. Industrial espionage and tar-
geted attacks: Understanding the characteristics of an escalating threat. In Proceedings of the International Workshop
on Recent Advances in Intrusion Detection. Springer, 64–85.
[122] Gina C. Tjhai, Maria Papadaki, Steven M. Furnell, and Nathan L. Clarke. 2008. The problem of false alarms: Evalua-
tion with snort and DARPA 1999 dataset. In Proceedings of the International Conference on Trust, Privacy and Security
in Digital Business. Springer, 139–150.
[123] Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing machine learning
models via prediction APIs. In Proceedings of the USENIX Security Symposium. 601–618.
[124] Muhammad Usman, Xiangjian He, Kenneth K. M. Lam, Min Xu, Jinjun Chen, Syed Mohsin Matloob Bokhari, and
Mian Ahmad Jan. 2017. Error concealment for cloud-based and scalable video coding of HD videos. IEEE Trans.
Cloud Comput. (2017).
[125] Muhammad Usman, Xiangjian He, Kin-Man Lam, Min Xu, Syed Mohsin Matloob Bokhari, and Jinjun Chen. 2016.
Frame interpolation for cloud-based mobile video streaming. IEEE Trans. Multimedia 18, 5 (2016), 831–839.
[126] Muhammad Usman, Mian Ahmad Jan, and Xiangjian He. 2017. Cryptography-based secure data storage and sharing
using HEVC and public clouds. Inf. Sci. 387 (2017), 90–102.
[127] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Muhammad Alam. 2018. Performance evaluation of high
definition video streaming over mobile ad hoc networks. Sign. Process. 148 (2018), 303–313.
[128] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Jinjun Chen. 2018. A mobile multimedia data collection
scheme for secured wireless multimedia sensor networks. IEEE Trans. Netw. Sci. Eng. (2018).
[129] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Jinjun Chen. 2019. P2DCA: A privacy-preserving based
data collection and analysis framework for IoMT applications. IEEE J. Select. Areas Commun. 37, 6 (2019), 1222–1230.
[130] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Priyadarsi Nanda. 2016. Data sharing in secure multimedia
wireless sensor networks. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA Conference. IEEE, 590–597.
[131] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Priyadarsi Nanda. 2018. QASEC: A secured data commu-
nication scheme for mobile ad-hoc networks. Fut. Gener. Comput. Syst. (2018).
[132] Muhammad Usman, Ning Yang, Mian Ahmad Jan, Xiangjian He, Min Xu, and Kin-Man Lam. 2018. A joint framework
for QoS and QoE for video transmission over wireless multimedia sensor networks. IEEE Trans. Mobile Comput. 17,
4 (2018), 746–759.
[133] Jorge Valenzuela, Jianhui Wang, and Nancy Bissinger. 2013. Real-time intrusion detection in power system opera-
tions. IEEE Trans. Power Syst. 28, 2 (2013), 1052–1062.
[134] Pascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Bengio, and Pierre-Antoine Manzagol. 2010. Stacked de-
noising autoencoders: Learning useful representations in a deep network with a local denoising criterion. J. Mach.
Learn. Res. 11, (Dec. 2010), 3371–3408.
[135] Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger. 2015. Network and
device forensic analysis of android social-messaging applications. Digital Investigation 14 (2015), S77–S84.
[136] Gai-Ge Wang, Xingjuan Cai, Zhihua Cui, Geyong Min, and Jinjun Chen. 2017. High performance computing for
cyber physical social systems by using evolutionary multi-objective optimization algorithm. IEEE Trans. Emerg. Top.
Comput. (2017). DOI:https://doi.org/10.1109/TETC.2017.2703784
[137] Penghong Wang, Jianrou Huang, Zhihua Cui, Liping Xie, and Jinjun Chen. 2019. A Gaussian error correction multi-
objective positioning model with NSGA-II. Concurr. Comput.: Pract. Exper. (2019). DOI:https://doi.org/10.1002/cpe.
5464
[138] Marilyn Wolf and Dimitrios Serpanos. 2018. Safety and security in cyber-physical systems and Internet-of-Things
systems. Proc. IEEE 106, 1 (2018), 9–20.
[139] Guangyu Wu, Jian Sun, and Jie Chen. 2016. A survey on the security of cyber-physical systems. Contr. Theory Technol.
14, 1 (2016), 2–10.
[140] Longfei Wu, Xiaojiang Du, and Jie Wu. 2016. Effective defense schemes for phishing attacks on mobile computing
platforms. IEEE Trans. Vehic. Technol. 65, 8 (2016), 6678–6691.
[141] Mingtao Wu, Zhengyi Song, and Young B. Moon. 2017. Detecting cyber-physical attacks in CyberManufacturing
systems with machine learning methods. J. Intell. Manufact. 30, 3 (2017), 1111–1123.
[142] Miao Xie and Jiankun Hu. 2013. Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld.
In Proceedings of the 6th International Congress on Image and Signal Processing (CISP’13), Vol. 3. IEEE, 1711–1716.
[143] Miao Xie, Jiankun Hu, and Jill Slay. 2014. Evaluating host-based anomaly detection systems: Application of the one-
class svm algorithm to adfa-ld. In Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge
Discovery (FSKD’14). IEEE, 978–982.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.
111:28 M. Usman et al.
[144] Liqun Yang, Yuancheng Li, and Zhoujun Li. 2017. Improved-ELM method for detecting false data attack in smart
grid. Int. J. Electr. Power Energy Syst. 91 (2017), 183–191.
[145] Yasser Yasami and Saadat Pour Mozaffari. 2010. A novel unsupervised classification approach for network anomaly
detection by k-means clustering and ID3 decision tree learning methods. J. Supercomput. 53, 1 (2010), 231–245.
[146] Yanfang Ye, Lingwei Chen, Shifu Hou, William Hardy, and Xin Li. 2017. DeepAM: A heterogeneous deep learning
framework for intelligent malware detection. Knowl. Inf. Syst. 54, 2 (2017), 265–285.
[147] Maoqing Zhang, Hui Wang, Zhihua Cui, and Jinjun Chen. 2018. Hybrid multi-objective cuckoo search with dynam-
ical local search. Memetic Comput. 10, 2 (2018), 199–208. DOI:https://doi.org/10.1007/s12293-017-0237-2
[148] Xiaoke Zhu, Xiao-Yuan Jing, Liang Yang, Xinge You, Dan Chen, Guangwei Gao, and Yunhong Wang. 2017. Semi-
supervised cross-view projection-based dictionary learning for video-based person re-identification. IEEE Trans.
Circ. Syst. Vid. Technol. 28, 10 (2017), 2599–2611.
ACM Computing Surveys, Vol. 52, No. 6, Article 111. Publication date: October 2019.