Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields
Abstract
:1. Introduction
2. Cyber Security Technology Convergence
2.1. ICT Strategic Technology Trend
2.2. Cyber Security Technology Trends
2.3. Field of Cyber Security
2.4. Contribution, Discussion, and Insights from This Study
3. Research Methodology
3.1. Introduction to the Research Process
3.2. Deep Learning Algorithm for Identification and Prediction of Cyber Security Technology and Convergence Fields
4. Research Experiments
4.1. Experimental Data
4.2. Cyber Security Related Papers and Patent Trend Analysis
4.3. Cyber Security Keyword Extraction and Domain Identification
4.4. Trend Analysis of Cyber Security Area and Convergence Field
5. In-Depth Analysis of Cyber Security Convergence Area
5.1. Connection Strength in the Cyber Security Convergence Domain
5.2. Trend Analysis and Forecasting of Cyber Security Convergence Area
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar] [CrossRef]
- Gupta, M.; Rees, J.; Chaturvedi, A.; Chi, J. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach. Decis. Support Syst. 2006, 41, 592–603. [Google Scholar] [CrossRef]
- Razzaq, A.; Hur, A.; Ahmad, H.F.; Masood, M. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Proceedings of the 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), Mexico City, Mexico, 6–8 March 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Mendhurwar, S.; Mishra, R. Integration of social and IoT technologies: Architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst. 2019, 15, 565–584. [Google Scholar] [CrossRef]
- Soni, S.; Bhushan, B. Use of Machine Learning algorithms for designing efficient cyber security solutions. In Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, 5–6 July 2019; pp. 1496–1501. [Google Scholar] [CrossRef]
- Asghar, M.R.; Hu, Q.; Zeadally, S. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Netw. 2019, 165, 106946. [Google Scholar] [CrossRef]
- Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
- Sengan, S.; Subramaniyaswamy, V.; Nair, S.K.; Indragandhi, V.; Manikandan, J.; Ravi, L. Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Gener. Comput. Syst. 2020, 112, 724–737. [Google Scholar] [CrossRef]
- Tianju, S.; Yilin, M.; Damián Marelli Ximing, S.; Minyue, F. The Vulnerability of Cyber-Physical System Under Stealthy Attacks. IEEE Trans. Autom. Control 2021, 66, 637–650. [Google Scholar]
- Abomhara, M.; Køien, G.M. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
- Sui, T.; Sun, X.M. The vulnerability of distributed state estimator under stealthy attacks. Automatica 2021, 133, 109869. [Google Scholar] [CrossRef]
- Ilhan, I.; Karakose, M. Requirement Analysis for Cybersecurity Solutions in Industry 4.0 Platforms. In Proceedings of the 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, Turkey, 21–22 September 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Culot, G.; Fattori, F.; Podrecca, M.; Sartor, M. Addressing Industry 4.0 Cybersecurity Challenges. IEEE Eng. Manag. Rev. 2019, 47, 79–86. [Google Scholar] [CrossRef]
- Alani, M.M.; Alloghani, M. Security Challenges in the Industry 4.0 Era. Ind. 4.0 Eng. Sustain. Future 2019, 117–136. [Google Scholar] [CrossRef]
- Elmaghraby, A.S.; Losavio, M.M. Cyber security challenges in Smart Cities: Safety, security and privacy. J. Adv. Res. 2014, 5, 491–497. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 2019, 86, 350–357. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N. Government regulations in cyber security: Framework, standards and recommendations. Futur. Gener. Comput. Syst. 2018, 92, 178–188. [Google Scholar] [CrossRef]
- Clark-Ginsberg, A.; Slayton, R. Regulating risks within complex sociotechnical systems: Evidence from critical infrastructure cybersecurity standards. Sci. Public Policy 2019, 46, 339–346. [Google Scholar] [CrossRef]
- Chhaya, L.; Sharma, P.; Kumar, A.; Bhagwatikar, G. Cybersecurity for Smart Grid: Threats, Solutions and Standardization. Adv. Greener Energy. Technol. 2020, 17–29. [Google Scholar] [CrossRef]
- ISO/IEC 27100. Information Technology-Security Techniques-Cyber Security-Overview and Concepts. 2019. Available online: https://www.iso27001security.com/html/27100.html (accessed on 11 December 2020).
- ISO/IEC 27101. Information Security, Cyber Security and Privacy Protection-Cyber Security Framework Development Guidelines. 2019. Available online: https://www.iso27001security.com/html/27101.html (accessed on 11 December 2020).
- ISO/IEC 27102. Information Security Management-Guidelines for Cyber-Insurance. 2019. Available online: https://www.iso27001security.com/html/27102.html (accessed on 11 December 2020).
- ISO/IEC 27103. Information Technology-Security Techniques-Cyber Security and ISO and IEC Standards. 2019. Available online: https://www.iso27001security.com/html/27103.html (accessed on 11 December 2020).
- ISO/IEC 27032. Information Technology-Security Techniques-Guidelines for Cyber Security. 2012. Available online: https://www.iso27001security.com/html/27032.html (accessed on 11 December 2020).
- Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef] [Green Version]
- Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
- Saravanan, A.; Bama, S.S. A Review on Cyber Security and the Fifth Generation Cyberattacks. Orient. J. Comput. Sci. Technol. 2016, 12, 50–56. [Google Scholar] [CrossRef]
- Lee, J.; Wu, F.; Zhao, W.; Ghaffari, M.; Liao, L.; Siegel, D. Prognostics and health management design for rotary machinery systems—Reviews, methodology and applications. Mech. Syst. Signal Process. 2013, 42, 314–334. [Google Scholar] [CrossRef]
- Silva, E.C. Accidents and the technology. J. Loss Prev. Process Ind. 2017, 49, 319–325. [Google Scholar] [CrossRef]
- Daim, T.U.; Rueda, G.; Martin, H.; Gerdsri, P. Forecasting emerging technologies: Use of bibliometrics and patent analysis. Technol. Forecast. Soc. Chang. 2006, 73, 981–1012. [Google Scholar] [CrossRef]
- Dotsika, F.; Watkins, A. Identifying potentially disruptive trends by means of keyword network analysis. Technol. Forecast. Soc. Chang. 2017, 119, 114–127. [Google Scholar] [CrossRef] [Green Version]
- Song, B.; Suh, Y. Identifying convergence fields and technologies for industrial safety: LDA-based network analysis. Technol. Forecast. Soc. Chang. 2018, 138, 115–126. [Google Scholar] [CrossRef]
- Li, X.; Xie, Q.; Daim, T.; Huang, L. Forecasting technology trends using text mining of the gaps between science and technology: The case of perovskite solar cell technology. Technol. Forecast. Soc. Chang. 2019, 146, 432–449. [Google Scholar] [CrossRef]
- Abraham, C.; Chatterjee, D.; Sims, R.R. Muddling through cybersecurity: Insights from the U.S. healthcare industry. Bus. Horizons 2019, 62, 539–548. [Google Scholar] [CrossRef]
- Santos, C.; Mehrsai, A.; Barros, A.C.; Araujo, M.; Ares, E. Towards Industry 4.0: An overview of European strategic roadmaps. Procedia Manuf. 2017, 13, 972–979. [Google Scholar] [CrossRef]
- Chen, H.; Zhang, G.; Zhu, D.; Lu, J. Topic-based technological forecasting based on patent data: A case study of Australian patents from 2000 to 2014. Technol. Forecast. Soc. Chang. 2017, 119, 39–52. [Google Scholar] [CrossRef]
- Golembiewski, B.; Stein, N.V.; Sick, N.; Wiemhöfer, H.-D. Identifying trends in battery technologies with regard to electric mobility: Evidence from patenting activities along and across the battery value chain. J. Clean. Prod. 2015, 87, 800–810. [Google Scholar] [CrossRef]
- Blei, D.M.; Ng, A.Y.; Jordan, M.I. Latent dirichlet allocation. J. Mach. Learn. Res. 2003, 3, 993–1022. [Google Scholar]
- Sievert, C.; Shirley, K. LDAvis: A method for visualizing and interpreting topics. In Proceedings of the Workshop on Interactive Language Learning, Visualization, and Interfaces, Baltimore, MD, USA, 27 June 2014; pp. 63–70. [Google Scholar]
- Blei, D.M.; Lafferty, J.D. Dynamic topic models. In Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh Pennsylvania, USA, 25–29 June 2006; pp. 113–120. [Google Scholar]
- Yao, F.; Wang, Y. Tracking urban geo-topics based on dynamic topic model. Comput. Environ. Urban Syst. 2019, 79, 101419. [Google Scholar] [CrossRef]
- Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]
- Tian, Y.; Zhang, K.; Li, J.; Lin, X.; Yang, B. LSTM-based traffic flow prediction with missing data. Neurocomputing 2018, 318, 297–305. [Google Scholar] [CrossRef]
- Panetta, K. Gartner Top 10 Strategic Technology Trends for 2020. 2019. Available online: https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020/ (accessed on 11 December 2020).
- Gartner, Hype Cycle for Risk Management. 2019. Available online: https://www.gartner.com/en/documents/3953584 (accessed on 23 March 2022).
International Standard for Cyber Security | Contents | Status |
---|---|---|
ISO/IEC 27100 | Information technology—Cyber security—Overview and concepts | WD |
ISO/IEC 27101 | Information technology—Security techniques—Cyber security—Framework development guidelines | WD |
ISO/IEC 27102 | Information security management—Guidelines for cyber insurance | IS |
ISO/EIC 27103 | Information technology—Security techniques—Cyber security and ISO and IEC Standards | IS (TR) |
ISO/EIC 27032 | Information technology—Security techniques—Guidelines for cyber security | IS (Under revision) |
2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 |
---|---|---|---|---|---|---|---|---|---|---|
Cloud Computing | Cloud Computing | Media Tablets and Beyond | Mobile Device Battles | Mobile Device Diversity and Management | Computing Everywhere | The Device Mesh | AI and Advanced Machine Learning | AI Foundation | Autonomous Things | Hyperautomation |
Virtualization for Availability | Mobile Applications and Media Tablets | Mobile-centric Applications and Interfaces | Mobile Applications and HTML 5 | Mobile Apps and Applications | The Internet of Things | Ambient User Experience | Intelligent Apps | Intelligent Apps and Analytics | Augmented Analytics | Multiexperience |
Reshaping the Data Center | Social Communications and Collaboration | Social and Contextual User Experience | Personal Cloud | The Internet of Everything | 3D Printing | 3D Printing Materials | Intelligent Things | Intelligent Things | AI-Driven Development | Democratization of Expertise |
IT for Green | Video | Application Stores and Marketplace | Internet of Things | Hybrid Cloud and IT as Service Broker | Advanced, Pervasive, and Invisible Analytics | Information of Everything | Virtual and Augmented Reality | Digital Twin | Digital Twins | Human Augmentation |
Client Computing | Next-Generation Analytics | The Internet of everything | Hybrid IT and Cloud Computing | Cloud/Client | Context-Rich Systems | Advanced Machine Learning | Digital Twin | Cloud to the Edge | Empowered Edge | Transparency and Traceability |
Mobile applications | Social Analytics | Next-Generation Analytics | Strategic Big Data | The Era of Personal Cloud | Smart Machines | Autonomous Agents and Things | Blockchain and Distributed Ledgers | Conversational Platformst | Immersive Experience | The Empowered Edge |
Advanced Analytics | Context-Aware Computing | Big Data | Actionable Analytics | Software-Defined Anything | Cloud/Client Computing | Adaptive Security Architecture | Conversational System | Immersive Experience | Blockchain | Distributed Cloud |
Social Computing | Storage Class Memory | In-Memory Computing | Mainstream In-Memory Computing | Web-Scale IT | Software-Defined Applications and Infrastructure | Advanced System Architecture | Mesh App and Service Architecture | Blockchain | Smart Spaces | Autonomous Things |
Security—Activity Monitoring | Ubiquitous Computing | Extreme Low-Energy Servers | Integrated Ecosystems | Smart Machines | Web-Scale IT | Mesh App and Service Architecture | Digital Technology Platforms | Event Driven | Digital Ethics and Privacy | Practical Blockchain |
Flash Memory | Fabric-Based Infrastructure and Computers | Cloud Computing | Enterprise App Stores | 3D Printing | Risk-Based Security and Self-Protection | Internet of Things Platforms | Adaptive Security Architecture | Continuous Adaptive Risk and Trust | Quantum Computing | AI Security |
Strategy Technology | Keyword |
---|---|
Artificial intelligence | Big Data, Artificial Intelligence, Machine Learning, Deep Learning |
5G | ALL IP, Network Slicing, Network Neutrality, Cord-cutting |
Robot | Artificial Intelligence, Smart Factory, Human–Robot Collaboration, Humanoid |
Drone | Quadcopter, 4 Channels, Calibration, Hovering, Flight Controller |
Interactive platform | Smart Secretary, Natural Language Processing, Amazon Skills, Corpus, Chatbot Builder |
Realistic media | Realistic Media, Virtual Reality, Augmented Reality, Mixed Reality |
Blockchain | Distributed Ledger Technology, Blockchain, Initial Coin Offering, Byzantine Generals Problem, Consensus Algorithm, Oracle Problems |
Main Category | Middle Category | Small Category | Hype Cycle Technology Name |
---|---|---|---|
Network Security | Wired network security | Perimeter security | IDPS |
Secure connection | |||
DDoS response | |||
Wireless network security | Mobile communication network security | Mobile Threat Defense | |
Wireless local area network security | |||
Cloud security | Virtualization platform security | Cloud Security Assessments | |
Cloud security service | |||
Software defined security | |||
Data and application service security | Application security | Web security | Secure Web/Gateways |
Email security | |||
Database security | |||
Data security | Privacy protection | Data Loss/Prevention | |
Data leakage prevention | |||
Digital copyright infringement/right protection | |||
E-money, Fintech security | E-money security | The Programmable/Economy | |
Blockchain security | |||
Electronic transaction/abnormal behavior detection | |||
Prevention of transactions and fraud | |||
Digital forensics | Digital Evidence/Collection and Analysis | E-Discovery Software | |
Anti-Forensic Response | |||
Physical Security | Human/bio-recognition | Biometric sensor | Biometric/Authentication/Methods |
Biometric engine | |||
Human recognition and search | |||
Human/bio-recognition application | |||
CCTV surveillance/control | Camera and storage device | Video/Image Analytics | |
VMS/integrated control | |||
Intelligent video surveillance | |||
CCTV infrastructure protection | |||
Secure search and unmanned electronic guard | Interpersonal Search Machine | ||
Luggage/Luggage Finder | |||
Alarm monitoring | |||
Unmanned electronic security service | |||
System and password security | Cryptographic technique | Password design | Database Encryption |
Cryptographic side channel analysis | |||
Password analysis | |||
Certification/authorization technique | Universal authentication | Externalized Authorization Management | |
ID management and access control | |||
Bio certification | |||
Security vulnerability | SW vulnerability analysis | Vulnerability Assessment | |
HW vulnerability analysis | |||
System security | Operating system security | Data Loss Prevention | |
Virtualization security | |||
System access control | |||
Malware | Malware response | DLP for Mobile Devices | |
Ransomware response | |||
Threat analysis and control | Intelligent cyber threat analysis | SIEM | |
Security information analysis and log management | |||
Security control | |||
IoT Security | Home city security | Home City Device Security and Control | Smart City Framework |
Home City Data Privacy | |||
Industrial control system security | Smart factory security | Operational Technology Security | |
Infrastructure security | |||
Smart energy security | |||
Vehicle security | Communication security inside and outside the vehicle | Mobile Device Integration Into Automobiles | |
Access control inside and outside the vehicle | |||
Car intrusion detection | |||
Vehicle security vulnerability diagnosis | |||
Ship, ocean, and air security | Prevention of hacking of autonomous ships | Autonomous Vehicles | |
Shipping port communication security | |||
Marine infrastructure security control | |||
Unmanned vehicle security | |||
Aviation infrastructure security control | |||
Healthcare, Medical security | Healthcare device/sensor security | Real-Time Health System Command Center | |
Medical data security and sharing | |||
Other ICT security | Artificial intelligence and robot security | IoT Securities |
Type | Conference and Journal Scope and Patent Search Keywords | ||
---|---|---|---|
Paper Scope | ACMCCS | Cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy, etc. | |
Usenix Security | System security, network security, security analysis, data-driven security and measurement studies, privacy-enhancing technologies and anonymity, language-based security, hardware security, social issues and security, applications of cryptography, etc. | ||
NDSS | Cyber-crime defense and forensics, security and privacy for blockchains and cryptocurrencies, security for cloud/edge computing, security and privacy of mobile/smartphone platforms, security for cyber–physical systems, security and privacy of systems based on machine learning and AI, etc. | ||
IEEE Security & Privacy | Application security, attacks and defenses, authentication, blockchains and distributed ledger security, cloud security, cyber physical systems security, distributed systems security, embedded systems security, forensics, etc. | ||
Patent Search Keywords | Application security, authentication technique, cloud security, cryptographic technology, digital forensics, home city security, ICT security, industrial control system security, malware, threat analysis and control, wireless network security, etc. | ||
Example of Metadata of Paper and Patent | Title | Finding File Upload Bugs via Penetration Testing | |
Author | Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son | ||
Abstract | An Unrestricted File Upload (UFU) vulnerability is a critical security threat that enables an adversary to upload her choice of a forged file to a target web server. | ||
Date | 9 November 2020 | ||
File | NDSS2020_17.pdf |
Paper Topic | Keywords | Patent Topic | Keywords |
---|---|---|---|
Topic 1 | strategy, vulnerability, payment, crash_report, merchant, circumvention, algorithm, flash, card, attack | Topic 1 | merchandise, patient, file, method, item, clinician, device, includes, base, programming |
Topic 2 | cache, extension, server, device, packed, defense, packing, chaperone, blacklist, compliance | Topic 2 | security, data, programmable, code, switching, cloud, metadata, home, physical, vulnerability |
Topic 3 | access, speech, attack, service, webassembly, device, macao, keyvalue, oram, delegation | Topic 3 | medical, threat, payment, data, binary, device, rolling, vehicle, healthcare, provisioning |
Topic 4 | unpublished_manuscript_inclusion_upcoming, prospective_author_requested_submit, event_described_paper, manager, keyless_entry, project, genetic, custos, phmon, finauth | Topic 4 | token, resource, control, server, node, characteristic, packet, message, network, monitoring |
Topic 5 | coverage, collision, stealthy, impact, investigation, document, protection, accident, vulnerability, malware | Topic 5 | provider, platform, identity, service, network, subscriber, policy, security, layer_signaling, application |
Topic 6 | firmware, isolation, grid, revocation, inverter, system, preview, attack, sender, email | Topic 6 | droplet, related, analyte, molecule, portion, commitment, quality, warm, performance, constraint |
Topic 7 | skill, functional, dongle, uiscope, block, mining, ecommerce, conversation, unsolicited, privacy sensitive | Topic 7 | module, extracted, registered, evidence, verification, set, copy, card, sending, artifact |
Topic 8 | allegation, trusted, poisoning, twitter, label, path, sealer, tkperm, package, escrow | Topic 8 | credential, image, pixel, administrative, standard, digital, private, encoded, region, portion |
Topic 9 | advice, droplet, filtering, netwarden, database, packet, besfs, seal, covert, intelligence | Topic 9 | domain_name, training, score, accelerator, test, model, legitimate, train, learning, target |
Topic 10 | plane, censor, upload, proxy, nonce_leakage, vulnerability, fuzzing, ecdsa, enclave, trip | Topic 10 | authentication, radar, principal, computing, advanced, weather, banking, login, mobile, surveillance |
Main Category | Middle Category | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Network Security | 1. Wired network security | T3 | T7 T3 | T1, T10 | T4 | T7 | T1 | T1 | T7 | T2 T3 | ||
2. Wireless network security | T5, T6 | T1, T3 | T3, T5 T3, T4, T10 | T1, T8 T2, T3, T6 | T4 T2, T3, T8 | T3 T3, T8 | T9 T4, T9 | T1, T2, T8 | T2, T7 T8, T10 | T1 T1, T5, T8, T10 | T9 T5 | |
3. Cloud security | T5, T8, T3 T2 | T2, T6, T7 T2, T4 | T2, T3, T10 T2, T4 | T2, T4 T3, T6, T9 | T5, T6, T7 T4, T5, T6, T7 | T6 T2, T4 | T7, T8 T1, T7 | T2, T5 T3, T7 | T3, T4, T5, T8 | T6, T7 | T3, T5 T2 | |
Data and application service security | 4. Application security | T1, T7, T3 | T5 | T1, T2, T6, T4, T8 | T5, T6, T7, T8, T2, T4, T9 | T5 | T1, T2, T7 T4, T10 | T10 T1, T7 | T1 | T4 | T1 T4 | T2, T6 T2 |
5. Data security | T2, T4 | T4 T3 | T10 | T8, T10 | T8, T9 T8 | T1 T7 | T7 | T3 | T2, T3 | T4 T2, T6, T7 | ||
6. E-money, Fintech security | T4, T10, T1, T10 | T7 T1, T2, T3, T6 | T5 T2, T10 | T1 | T4, T10 T9 | T10 T3 | T3, T10 T9 | T6, T7, T8 T1, T3, T4 | T2, T7, T10 T1, T3, T4, T8 | T2, T7 | ||
7. Digital forensics | T3 | T4 | T9 | T3, T5 | T9 | T3, T10 | ||||||
Physical Security | 8. Human/bio-recognition | T2, T8 | T10 | T4, T7 | T2 | T2 | T9 | T9 T9, T10 | T3, T9 T10 | |||
9. CCTV surveillance/control | T4, T7, T9 | T6, T7 | T7 | T2 | ||||||||
10. Secure search and unmanned electronic guard | T3, T5, T9 | T8, T10 | T1 | T2, T4 | T2, T9 | T1, T4, T7 | T10 | T10 | T7 | T7 | T4 | |
System and password security | 11. Cryptographic technique | T9 | T4 | T2 | T3 | T7 T5 | T6 | T2 | T3, T10 | T3, T5, T9 T9 | T8 | |
12. Certification/authorization technique | T8 | T3, T5 T1, T7 | T1 T7 | T3, T9 T7 | T4, T6 T1, T8, T9 | T7 T9 | T1 T2 | T4, T6, T7, T9 T3 | T2, T4, T9 T4, T7 | T3, T6 | T4, T9 T8, T10 | |
13. Security vulnerability | T6 | T4, T6, T7 T2, T9 | T8, T10 | T1, T2, T4, T5, T1, T4, T7 | T1, T2 T4 | T5 | T5 T4, T6 | T9 T4 | T1, T5 T2, T5 | T2, T6, T8 T6 | T1, T6 T4 | |
14. System security | T8 | T1 T4, T6 | T1, T2 | T6 | T6 | |||||||
15. Malware | T1, T9 | T1, T3, T4 | T2, T6, T7, T9 | T4, T6 T3 | T2 | T6 T8 | T2, T4 T1, T4, T7, T9 | T2, T7, T9 T2, T7 | T3, T8 | T1, T8, T10 | T2, T5 T1, T4 | |
16. Threat analysis and control | T8 T9 | T2 T10 | T7 T6, T10 | T8 T8 | T5 T7 | T10 T6 | T7, T9 T3 | T5 T1, T5 | T8 T5, T7 | T7 T4, T5, T10 | T10 T4 | |
IoT Security | 17. Home city security | T9 T2 | T8 T7 | T6 T1, T9 | T1, T3, T4, T6 T8 | T2 T3, T5, T10 | T8 T1 | T9 T7 | T6, T7 | T2 T5 | T4 T2 | T2 T7 |
18. Industrial control system security | T8 | T3 | T8 | T6 | ||||||||
19. Vehicle security | T1 | T9 T10 | T4 T5 | T1 T1, T5, T8 | T6 | T4 T1, T5 | T7 T3 | |||||
20. Ship, ocean, and air security | T5 | T9 | T10 | |||||||||
21. Healthcare, Medical security | T6 | T8 T6 | T5, T6, T10, T7 | T1 T5 | T1, T2, T6 | T3 T2, T3, T8 | T2, T6 | T1 | T1 T6 | T1, T3 | ||
22. Other ICT security | T8 | T3 | T8 | T5 | T5 T9 |
Visualization in 2010 | Convergence Area | Connection Keyword |
---|---|---|
Healthcare, medical security Wireless network security | Authentication | |
CCTV surveillance/control Cloud security Data security Home city security Human/bio-recognition Secure search and unmanned electronic guard | Device | |
Application security Malware | Malware | |
CCTV surveillance/control E-money, fintech security Secure search and unmanned electronic guard | Method | |
Cloud security E-money, fintech security Secure search and unmanned electronic guard | Network | |
CCTV surveillance/control E-money, fintech security Secure search and unmanned electronic guard Threat analysis and control Vehicle security | Security | |
Cloud security Secure search and unmanned electronic guard Wireless network security | User | |
Visualization in 2012 | Convergence Area | Connection Keyword |
E-money, fintech security Home city security Secure search and unmanned electronic guard | Device | |
Cloud security E-money, fintech security | Security | |
Visualization in 2014 | Convergence Area | Connection Keyword |
Cloud security Healthcare, medical security Human/bio-recognition Secure search and unmanned electronic guard Wireless network security | Device | |
Cloud security Home city security Security vulnerability Wireless network security | Security | |
Visualization in 2016 | Convergence Area | Connection Keyword |
Application security Cloud security Malware | Data | |
Healthcare, medical security Malware | Device | |
Application security Cloud security Malware Security vulnerability Wireless network security | Security | |
Visualization in 2018 | Convergence Area | Connection Keyword |
Cloud security E-money, fintech security Security vulnerability Threat analysis and control | Data | |
Certification/authorization technique Cloud security E-money, fintech security Security vulnerability | Device | |
Cloud security Eata security E-money, fintech security Malware | Malware | |
Cloud security E-money, fintech security | Method | |
E-money, fintech security Security vulnerability | Security | |
Certification/authorization technique E-money, fintech security | User | |
Visualization in 2020 | Convergence Area | Connection Keyword |
Application security Certification/authorization technique Cloud security Data security E-money, fintech security Home city security Human/bio-recognition Malware Security vulnerability Wired network security | Attack | |
Application security Cloud security Data security Healthcare, medical security | Data | |
Application security Cloud security Digital forensics E-money, fintech security Healthcare, medical security Home city security Human/bio-recognition Malware Wired network security | Device | |
Malware Security vulnerability Wireless network security | Network | |
Application security Cloud security Data security Healthcare, medical Security Malware Wireless network security | Security | |
Malware Wired network security | Server | |
Application security Malware Security vulnerability | System | |
Application security Cloud security Malware Security vulnerability | Vulnerability |
Paper Topic | Keywords | Patent Topic | Keywords |
---|---|---|---|
Topic 1 | computation, efficient, protocol, secure, cryptographic, encryption, practical, implementation, scheme, server, encrypted | Topic 1 | associated, request, access, server, communication, device, network, second, client, authentication, wireless |
Topic 2 | adversary, channel, cache, attacker, defense, network, attack, mechanism, vulnerability, server, threat, authentication, vulnerable, system, demonstrate | Topic 2 | communication, packet, system, mobile, device, network, node, includes, vehicle, computing, control |
Topic 3 | software, policy, control, tool, flow, memory, fuzzing, bug, implementation, vulnerability, application, program, kernel | Topic 3 | memory, industrial, device, cryptographic, processor, includes, value, unit, operation, control |
Topic 4 | binary, detection, feature, detecting, accuracy, tool, classifier, malware, spam, model, detect, technique, domain, malicious | Topic 4 | software, target, object, test, vulnerability, network, detection, malware, includes, source, sample, identifying, embodiment |
Topic 5 | password, website, user, payment, internet, network, account, site, content, online, service, transaction | Topic 5 | medical, financial, patient, communication, encrypted, healthcare, device, document, transaction, record, secure, message |
Topic 6 | software, policy, author, challenge, technology, risk, issue, trust, secure, cyber security, development, article, community, threat, system | Topic 6 | home, method, user, searching, system, smart, network, search, result, database, engine, provides, query |
Topic 7 | android, device, user, image, permission, mechanism, mobile, location, access, application, authentication | Topic 7 | associated, threat, process, system, event, detection, second, includes, action, automation, control |
Topic 8 | enclave, intel, phone, attack, voice, manager, processor, hardware, trusted, system, audio | Topic 8 | service, said, platform, access, customer, entity, container, environment, storage, cloud, policy, virtual |
Topic 9 | router, anonymity, advertisement, workshop, society, internet, network, networking, routing, edge, paper, node | Topic 9 | merchandise, component, plurality, system, sensor, vulnerability, configured, includes, risk, score, item |
Topic 10 | storage, provenance, service, provider, process, memory, cloud, monitoring, access, cloud computing, system, overhead, event | Topic 10 | image, display, camera, content, forensic, digital, position, portion, structure, apparatus, includes, circuit, capture |
Main Category | Middle Category | 2010 Year–2020 Year |
---|---|---|
Network Security | 1. Wired network security | T2 |
2. Wireless network security | T2 T2 | |
3. Cloud security | T10 T8 | |
Data and application service security | 4. Application security | T9 T6 |
5. Data security | T6 | |
6. E-money, Fintech security | T5 T5, T10 | |
7. Digital forensics | - | |
Physical Security | 8. Human/bio-recognition | - |
9. CCTV surveillance/control | - | |
10. Secure search and unmanned electronic guard | T9 | |
System and password security | 11. Cryptographic technique | T1 |
12. Certification/authorization technique | T8 T1 | |
13. Security vulnerability | T3 T3 | |
14. System security | - | |
15. Malware | T2, T4 T4 | |
16. Threat analysis and control | T6 T7 | |
IoT Security | 17. Home city security | T7 T2, T6 |
18. Industrial control system security | - | |
19. Vehicle security | - | |
20. Ship, ocean, and air security | - | |
21. Healthcare, Medical security | T5, T8 | |
22. Other ICT security | - |
Security Fields | Number of Paper and Patent in Last Year (2019) | Average Number of Papers and Patent | Paper and Patent CAGR (Number) | Average Proportion of Papers and Patents | Paper and Patent CAGR (Proportion) |
---|---|---|---|---|---|
1. Wired network security | 58 | 41.40 | 8.87% | 4.25% | −0.57% |
2. Wireless network security | 103 | 73.20 | 12.05% | 7.37% | 2.33% |
3. Cloud security | 104 | 65.60 | 10.03% | 6.61% | 0.49% |
4. Application security | 155 | 121.90 | 10.14% | 12.54% | 0.59% |
5. Data security | 59 | 53.20 | 10.51% | 5.55% | 0.93% |
6. E-money, Fintech security | 69 | 81.00 | 6.85% | 8.47% | −2.41% |
10. Secure search and unmanned electronic guard | 28 | 30.40 | 9.87% | 3.20% | 0.34% |
11. Cryptographic technique | 62 | 69.50 | −1.95% | 7.81% | −10.45% |
12. Certification/authorization technique | 35 | 27.20 | 3.36% | 2.94% | −5.61% |
13. Security vulnerability | 103 | 77.80 | 10.48% | 7.74% | 0.90% |
15. Malware | 129 | 96.10 | 10.16% | 9.73% | 0.61% |
16. Threat analysis and control | 81 | 43.70 | 23.64% | 4.20% | 12.91% |
17. Home city security | 183 | 144.00 | 12.78% | 14.57% | 3.00% |
21. Healthcare, Medical security | 55 | 49.20 | 9.65% | 5.01% | 0.14% |
Convergence Number | Convergence Area | Connection Keywords |
---|---|---|
1 | Certification/authorization technique Home city security | Access |
2 | Malware Wired network security Wireless network security | Adversary, attack, attacker, channel, defense |
3 | Home city security Security vulnerability | Application |
4 | Cloud security Healthcare, medical security | Cloud |
5 | Certification/authorization technique Home city security Wireless network security | Communication |
6 | Home city security Security vulnerability Threat analysis and control Wireless network security | Control, environment |
7 | Cryptographic technique Security vulnerability | Cryptographic, implementation |
8 | Certification/authorization technique Home city security Security vulnerability Wireless network security | Device |
9 | Application security Data security Home city security | Home, search |
10 | E-money, fintech security Healthcare, medical security | Medical, patient, transaction |
11 | Home city security Wireless network security | Mobile, node, vehicle |
12 | Application security Certification/authorization technique Home city security Malware Wired network security Wireless network security | Network |
13 | Cloud security Healthcare, medical security Threat analysis and control | Policy |
14 | Cryptographic technique E-money, fintech security Healthcare, medical security | Secure |
15 | Certification/authorization technique Cryptographic technique | Server |
16 | Malware Security vulnerability | Software, vulnerability |
17 | Home city security Threat analysis and control Wired network security Wireless network security | System |
18 | Malware Threat analysis and control | Threat |
19 | E-money, fintech security Home city security | User |
Security Fields | Number of Papers and Patents in Last Year (2019) | Average Number of Papers and Patents | Paper and Patent CAGR (Number) | Average Proportion of Papers and Patents | Paper and Patent CAGR (Proportion) |
---|---|---|---|---|---|
Convergence 1 | 218 | 171.20 | 1 Wiki 0.61% | 4.05% | 0.20% |
Convergence 2 | 290 | 210.70 | 10.51% | 4.94% | 0.11% |
Convergence 3 | 286 | 221.80 | 11.90% | 5.16% | 1.37% |
Convergence 4 | 159 | 114.80 | 9.90% | 2.70% | −0.44% |
Convergence 5 | 321 | 244.40 | 11.05% | 5.75% | 0.60% |
Convergence 6 | 470 | 338.70 | 13.28% | 7.82% | 2.62% |
Convergence 7 | 165 | 147.30 | 3.99% | 3.62% | −5.79% |
Convergence 8 | 424 | 322.20 | 10.91% | 7.54% | 0.47% |
Convergence 9 | 397 | 319.10 | 11.34% | 7.56% | 0.87% |
Convergence 10 | 124 | 130.20 | 8.01% | 3.14% | −2.15% |
Convergence 11 | 286 | 217.20 | 12.51% | 5.07% | 1.93% |
Convergence 12 | 663 | 503.80 | 10.45% | 11.90% | 0.06% |
Convergence 13 | 240 | 158.50 | 12.98% | 3.66% | 2.36% |
Convergence 14 | 186 | 199.70 | 3.54% | 4.96% | −6.20% |
Convergence 15 | 97 | 96.70 | −0.34% | 2.51% | −9.71% |
Convergence 16 | 232 | 173.90 | 10.30% | 4.04% | −0.07% |
Convergence 17 | 425 | 302.30 | 13.31% | 7.02% | 2.65% |
Convergence 18 | 210 | 139.80 | 13.72% | 3.22% | 3.03% |
Convergence 19 | 252 | 225.00 | 10.82% | 5.34% | 0.39% |
Connection Strength (1) | Convergence Area | Connection Keyword |
---|---|---|
Certification/authorization technique Home city security | Access | |
Malware Wired network security Wireless network security | Adversary, attack, attacker, channel, defense | |
Home city security Security vulnerability | Application | |
Cloud security Healthcare, medical security | Cloud | |
Certification/authorization technique Home city security Wireless network security | Communication | |
Home city security Security vulnerability Threat analysis and control Wireless network security | Control, environment | |
Cryptographic technique Security vulnerability | Cryptographic, implementation | |
Certification/authorization technique Home city security Security vulnerability Wireless network security | Device | |
Application security Data security Home city security | Home, search | |
E-money, fintech security Healthcare, medical security | Medical, patient, transaction | |
Home city security Wireless network security | Mobile, node, vehicle | |
Application security Certification/authorization technique Home city security Malware Wired network security Wireless network security | Network | |
Cloud security Healthcare, medical security Threat analysis and control | Policy | |
Cryptographic technique E-money, fintech security Healthcare, medical security | Secure | |
Certification/authorization technique Cryptographic technique | Server | |
Malware Security vulnerability | Software, vulnerability | |
Home city security Threat analysis and control Wired network security Wireless network security | System | |
Malware Threat analysis and control | Threat | |
E-money, fintech security Home city security | User | |
Connection Strength (2) | Convergence Area | Connection Keyword |
Malware Wired network security Wireless network security | Attack, attacker | |
Cloud security Healthcare, medical security | Cloud | |
Certification/authorization technique Home city security Wireless network security | Device | |
Application security Certification/authorization technique Home city security Malware Wired network security Wireless network security | Network | |
Application security Data security Home city security | Search | |
Connection Strength (3) | Convergence Area | Connection Keyword |
Malware Wired network security Wireless network security | Attack | |
Certification/authorization technique Home city security Wireless network security | Device | |
Application security Home city security Wireless network security | Network | |
Connection Strength (4) | Convergence Area | Connection Keyword |
Malware Wired network security Wireless network security | Attack | |
Certification/authorization technique Home city security Wireless network security | Device | |
Home city security Wireless network security | Network |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hwang, S.-Y.; Shin, D.-J.; Kim, J.-J. Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields. Symmetry 2022, 14, 683. https://doi.org/10.3390/sym14040683
Hwang S-Y, Shin D-J, Kim J-J. Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields. Symmetry. 2022; 14(4):683. https://doi.org/10.3390/sym14040683
Chicago/Turabian StyleHwang, Seung-Yeon, Dong-Jin Shin, and Jeong-Joon Kim. 2022. "Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields" Symmetry 14, no. 4: 683. https://doi.org/10.3390/sym14040683
APA StyleHwang, S. -Y., Shin, D. -J., & Kim, J. -J. (2022). Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields. Symmetry, 14(4), 683. https://doi.org/10.3390/sym14040683