A Review of Computer Vision Methods in Network Security

05/07/2020
by   Jiawei Zhao, et al.
19

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day. Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providing attackers with more opportunities to exploit. Traditional machine learning methods have been frequently used in the context of network security. However, such methods are more based on statistical features extracted from sources such as binaries, emails, and packet flows. On the other hand, recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks. At a glance, it is not trivial to see how computer vision methods are related to network security. Nonetheless, there is a significant amount of work that highlighted how methods from computer vision can be applied in network security for detecting attacks or building security solutions. In this paper, we provide a comprehensive survey of such work under three topics; i) phishing attempt detection, ii) malware detection, and iii) traffic anomaly detection. Next, we review a set of such commercial products for which public information is available and explore how computer vision methods are effectively used in those products. Finally, we discuss existing research gaps and future research directions, especially focusing on how network security research community and the industry can leverage the exponential growth of computer vision methods to build much secure networked systems.

READ FULL TEXT

page 1

page 23

page 37

research
04/03/2019

Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions

My research lies in the intersection of security and machine learning. T...
research
08/01/2021

Advances in adversarial attacks and defenses in computer vision: A survey

Deep Learning (DL) is the most widely used tool in the contemporary fiel...
research
10/25/2022

Deep Crowd Anomaly Detection: State-of-the-Art, Challenges, and Future Research Directions

Crowd anomaly detection is one of the most popular topics in computer vi...
research
06/25/2022

Review on Social Behavior Analysis of Laboratory Animals: From Methodologies to Applications

As the bridge between genetic and physiological aspects, animal behaviou...
research
01/24/2019

Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey

Computer vision has evolved in the last decade as a key technology for n...
research
06/29/2023

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

Enterprise networks that host valuable assets and services are popular a...
research
01/31/2021

MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software

Computer vision is playing an increasingly important role in automated m...

Please sign up or login with your details

Forgot password? Click here to reset