2000 character limit reached
A Survey of Large Language Models in Cybersecurity (2402.16968v1)
Published 26 Feb 2024 in cs.CR and cs.AI
Abstract: LLMs have quickly risen to prominence due to their ability to perform at or close to the state-of-the-art in a variety of fields while handling natural language. An important field of research is the application of such models at the cybersecurity context. This survey aims to identify where in the field of cybersecurity LLMs have already been applied, the ways in which they are being used and their limitations in the field. Finally, suggestions are made on how to improve such limitations and what can be expected from these systems once these limitations are overcome.
- Irena Bojanova and Carlos Eduardo C Galhardo. Bug, fault, error, or weakness: Demystifying software security vulnerabilities. IT Prof., 25(1):7–12, January 2023.
- An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming. International Cybersecurity Law Review, 4(4):387–397, September 2023.
- Jian hua Li. Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12):1462–1474, December 2018.
- Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artificial Intelligence Review, 55(2):1029–1053, March 2021.
- Automated software vulnerability detection with machine learning. February 2018.
- Software vulnerability detection using deep neural networks: A survey. Proc. IEEE Inst. Electr. Electron. Eng., 108(10):1825–1848, October 2020.
- Software vulnerability discovery techniques: A survey. In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE, November 2012.
- Just-in-time software vulnerability detection: Are we there yet? Journal of Systems and Software, 188:111283, 2022.
- Intelligent network intrusion prevention feature collection and classification algorithms. Algorithms, 14(8), 2021.
- A network intrusion detection system based on convolutional neural network. J. Intell. Fuzzy Syst., 38(6):7623–7637, June 2020.
- AI-driven cybersecurity: An overview, security intelligence modeling and research directions. SN Comput. Sci., 2(3), May 2021.
- Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discov. Internet Things, 1(1), December 2021.
- Trusting artificial intelligence in cybersecurity is a double-edged sword. Nat. Mach. Intell., 1(12):557–560, November 2019.
- Language models are unsupervised multitask learners. 2018.
- LLaMA: Open and efficient foundation language models. February 2023.
- OpenAI. GPT-4 technical report. March 2023.
- Automated penetration testing using deep reinforcement learning. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 2–10, 2020.
- A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Computers & Electrical Engineering, 75:175–188, 2019.
- Autonomous penetration testing using reinforcement learning. CoRR, abs/1905.05965, 2019.
- RÂ A Kemmerer. Cybersecurity. In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003.
- Cyber security threats and vulnerabilities: A systematic mapping study. Arabian Journal for Science and Engineering, 45(4):3171–3189, January 2020.
- An investigation on cyber security threats and security models. In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pages 307–311, 2015.
- An overview of penetration testing. International Journal of Network Security & Its Applications, 3(6):19, 2011.
- An overview of vulnerability assessment and penetration testing techniques. Journal of Computer Virology and Hacking Techniques, 11:27–49, 2015.
- Cyber security analysis using vulnerability assessment and penetration testing. In 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pages 1–5. IEEE, 2016.
- F. Rosenblatt. The perceptron - a perceiving and recognizing automaton. Technical Report 85-460-1, Cornell Aeronautical Laboratory, Ithaca, New York, January 1957.
- The perceptron: a probabilistic model for information storage and organization in the brain. Psychological review, 65 6:386–408, 1958.
- Learning representations by back-propagating errors.
- Learning sets of filters using back-propagation. 2(1):35–61.
- Geoffrey E. Hinton. Learning multiple layers of representation. 11(10):428–434.
- Deep learning. 521(7553):436–444.
- Yoav Goldberg. A primer on neural network models for natural language processing, 2015.
- Attention Is All You Need.
- QLoRA: Efficient Finetuning of Quantized LLMs.
- LORA: LOW-RANK ADAPTATION OF LARGE LAN- GUAGE MODELS.
- LLaMA-Adapter: Efficient Fine-tuning of Language Models with Zero-init Attention.
- Language Models are Unsupervised Multitask Learners.
- Emergent abilities of large language models, 2022.
- Chain-of-Thought Prompting Elicits Reasoning in Large Language Models.
- Language Models are Few-Shot Learners.
- PassGAN: A deep learning approach for password guessing. September 2017.
- Attention is all you need. June 2017.
- Training language models to follow instructions with human feedback. March 2022.
- Evaluating large language models trained on code. July 2021.
- CodeBERT: A pre-trained model for programming and natural languages. February 2020.
- Controlling large language models to generate secure and vulnerable code. February 2023.
- Anastasiia Grishina. Enabling automatic repair of source code vulnerabilities using data-driven methods. February 2022.
- VulRepair: a t5-based automated software vulnerability repair. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, New York, NY, USA, November 2022. ACM.
- Transformer-based language models for software vulnerability detection. April 2022.
- WebGPT: Browser-assisted question-answering with human feedback. December 2021.
- Toolformer: Language models can teach themselves to use tools. February 2023.
- Tool learning with foundation models, 2023.
- Emergent autonomous scientific research capabilities of large language models. April 2023.
- Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions.
- An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures.
- Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments.
- Examining Zero-Shot Vulnerability Repair with Large Language Models. In 2023 IEEE Symposium on Security and Privacy (SP), pages 2339–2356.
- Marwan Omar. VulDefend: A Novel Technique based on Pattern-exploiting Training for Detecting Software Vulnerabilities Using Language Models. In 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pages 287–293.
- Harnessing GPT-4 for Generation of Cybersecurity GRC Policies: A Focus on Ransomware Attack Mitigation. page 103424.
- Detecting Phishing Sites Using ChatGPT.
- ChatIDS: Explainable Cybersecurity Using Generative AI.
- Devising and Detecting Phishing: Large language models vs. Smaller Human Models.
- Julian Hazell. Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns.
- Getting pwn’d by AI: Penetration Testing with Large Language Models.
- Revolutionizing Cyber Threat Detection with Large Language Models.
- SecureFalcon: The Next Cyber Reasoning System for Cyber Security.
- Prompting Is All You Need: Automated Android Bug Replay with Large Language Models.
- On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions.
- PentestGPT: An LLM-empowered Automatic Penetration Testing Tool.
- From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads.
- RatGPT: Turning online LLMs into Proxies for Malware Attacks.
- Transformer-Based Language Models for Software Vulnerability Detection. In Proceedings of the 38th Annual Computer Security Applications Conference, pages 481–496. ACM.
- VulRepair: A T5-based automated software vulnerability repair. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pages 935–947. ACM.
- Large language models can be easily distracted by irrelevant context, 2023.
- Lost in the middle: How language models use long contexts, 2023.
- Self-contradictory hallucinations of large language models: Evaluation, detection and mitigation, 2023.
- On the origin of hallucinations in conversational models: Is it the datasets or the models?, 2022.
- Survey of hallucination in natural language generation. ACM Computing Surveys, 55(12):1–38, mar 2023.
- Siren’s song in the ai ocean: A survey on hallucination in large language models, 2023.
- On faithfulness and factuality in abstractive summarization, 2020.
- Instruction tuning for large language models: A survey, 2023.
- EW-tune: A framework for privately fine-tuning large language models with differential privacy. In 2022 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, nov 2022.
- Fine-Tuning Language Models with Just Forward Passes.
- Longlora: Efficient fine-tuning of long-context large language models, 2023.
- Parameter-efficient fine-tuning of large-scale pre-trained language models. Nature Machine Intelligence, 5(3):220–235, March 2023.
- Full parameter fine-tuning for large language models with limited resources, 2023.
- Speciality vs generality: An empirical study on catastrophic forgetting in fine-tuning foundation models, 2023.
- An empirical study of catastrophic forgetting in large language models during continual fine-tuning, 2023.
- Investigating the catastrophic forgetting in multimodal large language models, 2023.
- Larger language models do in-context learning differently, 2023.
- Retrieval-augmented generation for knowledge-intensive nlp tasks. In H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin, editors, Advances in Neural Information Processing Systems, volume 33, pages 9459–9474. Curran Associates, Inc., 2020.
- Recent advances in retrieval-augmented text generation. In Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’22, page 3417–3419, New York, NY, USA, 2022. Association for Computing Machinery.
- Generation-augmented retrieval for open-domain question answering, 2021.
- A survey on retrieval-augmented text generation, 2022.
- Retrieval-augmented generation for code summarization via hybrid gnn, 2021.
- Chain-of-verification reduces hallucination in large language models, 2023.
- Twenty years of mixture of experts. IEEE Transactions on Neural Networks and Learning Systems, 23(8):1177–1193, 2012.
- Mixture-of-experts with expert choice routing, 2022.
- From sparse to soft mixtures of experts, 2023.
- Training language models to follow instructions with human feedback, 2022.
- Code llama: Open foundation models for code, 2023.
- Llama 2: Open Foundation and Fine-Tuned Chat Models.
- OpenAI. GPT-4 Technical Report.
Collections
Sign up for free to add this paper to one or more collections.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.