论文标题

网络安全中计算机视觉方法的审查

A Review of Computer Vision Methods in Network Security

论文作者

Zhao, Jiawei, Masood, Rahat, Seneviratne, Suranga

论文摘要

由于数据泄露数量,关键基础架构的攻击以及恶意软件/lansomware/Cryptojacker攻击几乎每天都在报告,网络安全已成为比以往任何时候都更重要的领域。我们越来越依靠网络基础架构,随着物联网的出现,数十亿个设备将连接到互联网,从而为攻击者提供更多利用的机会。传统的机器学习方法经常用于网络安全性。但是,此类方法更多的是基于从二进制文件,电子邮件和数据包流中提取的统计功能。 另一方面,近年来目睹了计算机视觉的惊人增长,这主要是由于卷积神经网络领域的进步所驱动的。乍一看,查看计算机视觉方法与网络安全性的关系并不是一件容易的事。尽管如此,仍有大量工作强调了如何将来自计算机视觉的方法应用于网络安全中,以检测攻击或构建安全解决方案。在本文中,我们在三个主题下对此类工作进行了全面的调查; i)网络钓鱼尝试检测,ii)恶意软件检测,iii)交通异常检测。接下来,我们审查一套为公共信息提供的商业产品,并探讨如何在这些产品中有效使用计算机视觉方法。最后,我们讨论了现有的研究差距和未来的研究方向,尤其是关注网络安全研究社区和行业如何利用计算机视觉方法的指数增长来构建许多安全的网络系统。

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day. Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providing attackers with more opportunities to exploit. Traditional machine learning methods have been frequently used in the context of network security. However, such methods are more based on statistical features extracted from sources such as binaries, emails, and packet flows. On the other hand, recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks. At a glance, it is not trivial to see how computer vision methods are related to network security. Nonetheless, there is a significant amount of work that highlighted how methods from computer vision can be applied in network security for detecting attacks or building security solutions. In this paper, we provide a comprehensive survey of such work under three topics; i) phishing attempt detection, ii) malware detection, and iii) traffic anomaly detection. Next, we review a set of such commercial products for which public information is available and explore how computer vision methods are effectively used in those products. Finally, we discuss existing research gaps and future research directions, especially focusing on how network security research community and the industry can leverage the exponential growth of computer vision methods to build much secure networked systems.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源