Sijjad Ali , Jia Wang , Victor C.M. Leung , Farhan Bashir , Uzair Aslam Bhatti , Shuaib Ahmed Wadho , Mamoona Humayun
{"title":"CLDM-MMNNs:基于多模态神经网络融合的端到端网络安全跨层防御机制——问题、挑战和未来方向","authors":"Sijjad Ali , Jia Wang , Victor C.M. Leung , Farhan Bashir , Uzair Aslam Bhatti , Shuaib Ahmed Wadho , Mamoona Humayun","doi":"10.1016/j.inffus.2025.103222","DOIUrl":null,"url":null,"abstract":"<div><div>Cybersecurity threats have grown in complexity and scale, necessitating robust defense mechanisms that integrate multiple layers of network security. Multi-modal neural networks (MMNNs) have emerged as a powerful tool for addressing such challenges due to their ability to process and integrate heterogeneous data sources. This review provides an in-depth analysis of cross-layer defense mechanisms that leverage MMNNs for end-to-end cybersecurity. The study explores the foundational principles of MMNNs, their applications in intrusion detection, malware analysis, anomaly detection, and advanced persistent threat (APT) mitigation. The paper emphasizes the synergy between multi-modal data integration and neural network architectures, enabling real-time threat detection and adaptive response. By categorizing existing approaches and highlighting key advancements, this review outlines current limitations, including computational overhead and model interpretability, and suggests future research directions for developing efficient, scalable, and explainable MMNN-based defense systems.</div></div>","PeriodicalId":50367,"journal":{"name":"Information Fusion","volume":"122 ","pages":"Article 103222"},"PeriodicalIF":14.7000,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CLDM-MMNNs: Cross-layer defense mechanisms through multi-modal neural networks fusion for end-to-end cybersecurity—Issues, challenges, and future directions\",\"authors\":\"Sijjad Ali , Jia Wang , Victor C.M. Leung , Farhan Bashir , Uzair Aslam Bhatti , Shuaib Ahmed Wadho , Mamoona Humayun\",\"doi\":\"10.1016/j.inffus.2025.103222\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Cybersecurity threats have grown in complexity and scale, necessitating robust defense mechanisms that integrate multiple layers of network security. Multi-modal neural networks (MMNNs) have emerged as a powerful tool for addressing such challenges due to their ability to process and integrate heterogeneous data sources. This review provides an in-depth analysis of cross-layer defense mechanisms that leverage MMNNs for end-to-end cybersecurity. The study explores the foundational principles of MMNNs, their applications in intrusion detection, malware analysis, anomaly detection, and advanced persistent threat (APT) mitigation. The paper emphasizes the synergy between multi-modal data integration and neural network architectures, enabling real-time threat detection and adaptive response. By categorizing existing approaches and highlighting key advancements, this review outlines current limitations, including computational overhead and model interpretability, and suggests future research directions for developing efficient, scalable, and explainable MMNN-based defense systems.</div></div>\",\"PeriodicalId\":50367,\"journal\":{\"name\":\"Information Fusion\",\"volume\":\"122 \",\"pages\":\"Article 103222\"},\"PeriodicalIF\":14.7000,\"publicationDate\":\"2025-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Fusion\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1566253525002957\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Fusion","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1566253525002957","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
CLDM-MMNNs: Cross-layer defense mechanisms through multi-modal neural networks fusion for end-to-end cybersecurity—Issues, challenges, and future directions
Cybersecurity threats have grown in complexity and scale, necessitating robust defense mechanisms that integrate multiple layers of network security. Multi-modal neural networks (MMNNs) have emerged as a powerful tool for addressing such challenges due to their ability to process and integrate heterogeneous data sources. This review provides an in-depth analysis of cross-layer defense mechanisms that leverage MMNNs for end-to-end cybersecurity. The study explores the foundational principles of MMNNs, their applications in intrusion detection, malware analysis, anomaly detection, and advanced persistent threat (APT) mitigation. The paper emphasizes the synergy between multi-modal data integration and neural network architectures, enabling real-time threat detection and adaptive response. By categorizing existing approaches and highlighting key advancements, this review outlines current limitations, including computational overhead and model interpretability, and suggests future research directions for developing efficient, scalable, and explainable MMNN-based defense systems.
期刊介绍:
Information Fusion serves as a central platform for showcasing advancements in multi-sensor, multi-source, multi-process information fusion, fostering collaboration among diverse disciplines driving its progress. It is the leading outlet for sharing research and development in this field, focusing on architectures, algorithms, and applications. Papers dealing with fundamental theoretical analyses as well as those demonstrating their application to real-world problems will be welcome.