Review Article

Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review

Table 5

Summary of the metalevel analysis of the literature on malware detection in platforms other than Windows, Android, and IoT or multiple platforms.

Ref.Description: method and features used to train and evaluate modelDL algorithm usedLibrary/framework usedTargeted platformDataset
Used
Accuracy/F1 score

[107]Malware dynamic behavior classification and family clustering algorithmCNN, GANNot statedWindows, androidDataCon, GreekPwnNot stated

[108]Detecting domain generation algorithms (DGAs) and automatically labelling domain names in real trafficLSTM RNNKeras, scikit-learnNot statedALexaBamb, RetroAbout 98%

[109]Deep learning-based intrusion detection system for detecting cyber-attacksNot statedTensorFlow, Keras, scikit-learnInternetKDDCup99, NSL KDD, UNSW-NB15, WSN-DS, CICIDS 2017, Kyoto85 ā€“ 99%

[110]An intrusion detection system to protect in-vehicle network, the controller area network (CAN) busCNNNot statedā€”Self-generated99%

[111]Source-based distributed denial-of-service defense system in fog and cloud computing systemsLSTMKeras, TensorFlowCloud computingHogzilla98.88%

[112]A hybrid deep learning-based system for detecting botnetCNN, RNNKeras, TensorFlow, scikit-learnInternetCTU-13, ISOT99.3% (CUT-13) 99.5% (ISOT)

[113]Using robust software modeling tool (RSMT) to monitor and characterize the behavior of web based applicationsSAEKeras, TensorFlow, scikit-learnInternetNot statedAbout 92%.

[114]Deep multilayer perceptron and RNN-based deep learning system for detecting cloud-based intrusionRNN, LSTMKeras, TensorFlow, TheanoCloud computingNot stated86.9%

[115]Malware detection in PDF filesCNNNot statedMultipleSelf-generatedUp to 98.92%

[116]Ransomware detection and classification by extracting event sequences during a program executionLSTM, CNNKeras, TensorFlowNot statedSelf-generated99.6%

[117]Malware detection in cloud platforms by extracting several features of each process, like CPU usage, memory usage, and disk usageCNNNot statedCloud IaaSSelf-generatedUp to 93%

[118]Using ML and DL techniques to distinguish normal traffic from cryptomining traffic by extracting the data flow featuresFully connected CNNKeras, TensorFlow, scikit-learnInternetSelf-generated mining traffic99.98%

[119]Malware detection on various platforms, including Windows, Android, IoT, IoBT, and the Internet by vector embeddingLSTMNot statedWindows, Android, IoT, IoBT, InternetVXHeaven, Drebin, Kaggle94.1% on average