Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Machine Learning in Metaverse Security: Current Solutions and Future Challenges

Published: 26 April 2024 Publication History
  • Get Citation Alerts
  • Abstract

    The Metaverse, positioned as the next frontier of the Internet, has the ambition to forge a virtual shared realm characterized by immersion, hyper-spatiotemporal dynamics, and self-sustainability. Recent technological strides in AI, Extended Reality, 6G, and blockchain propel the Metaverse closer to realization, gradually transforming it from science fiction into an imminent reality. Nevertheless, the extensive deployment of the Metaverse faces substantial obstacles, primarily stemming from its potential to infringe on privacy and be susceptible to security breaches, whether inherent in its underlying technologies or arising from the evolving digital landscape. Metaverse security provisioning is poised to confront various foundational challenges owing to its distinctive attributes, encompassing immersive realism, hyper-spatiotemporally, sustainability, and heterogeneity. This article undertakes a comprehensive study of the security and privacy challenges facing the Metaverse, leveraging machine learning models for this purpose. In particular, our focus centers on an innovative distributed Metaverse architecture characterized by interactions across 3D worlds. Subsequently, we conduct a thorough review of the existing cutting-edge measures designed for Metaverse systems while also delving into the discourse surrounding security and privacy threats. As we contemplate the future of Metaverse systems, we outline directions for open research pursuits in this evolving landscape.

    References

    [1]
    Yan Huang, Yi Joy Li, and Zhipeng Cai. 2023. Security and privacy in Metaverse: A comprehensive survey. Big Data Mining and Analytics 6, 2 (2023), 234–247.
    [2]
    Bernard Marr & Co. 2022. A Short History of the Metaverse. Retrieved November 21, 2022 from https://bernardmarr.com/a-short-history-of-the-metaverse/
    [3]
    Jie Guan, Jay Irizawa, and Alexis Morris. 2022. Extended reality and Internet of Things for hyper-connected Metaverse environments. In Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW’22). IEEE, 163–168.
    [4]
    Oracle. n.d. What Is IoT? Retrieved September 11, 2022 from https://www.oracle.com/ca-en/internet-of-things/what-is-iot/
    [5]
    Abbas M. Al-Ghaili, Hairoladenan Kasim, Naif M. Al-Hada, Zainuddin Hassan, Marini Othman, Tharik J. Hussain, Rafiziana Md. Kasmani, and Ibraheem Shayea. 2022. A review of Metaverse’s definitions, architecture, applications, challenges, issues, solutions, and future trends. IEEE Access 10 (2022), 125835–125866.
    [6]
    Danda B. Rawat and Hassan El Alami. 2023. Metaverse: Requirements, architecture, standards, status, challenges, and perspectives. IEEE Internet of Things Magazine 6, 1 (2023), 14–18.
    [7]
    Sang-Min Park and Young-Gab Kim. 2022. A Metaverse: Taxonomy, components, applications, and open challenges. IEEE Access 10 (2022), 4209–4251.
    [8]
    Lik-Hang Lee, Tristan Braud, Pengyuan Zhou, Lin Wang, Dianlei Xu, Zijun Lin, Abhishek Kumar, Carlos Bermejo, and Pan Hui. 2021. All one needs to know about Metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. arXiv preprint arXiv:2110.05352 (2021).
    [9]
    Blockchain Council. 2023. Metaverse vs. Virtual Reality: A Detailed Comparison? Retrieved September 11, 2022 from https://www.blockchain-council.org/metaverse/metaverse-vs-virtual-reality/
    [10]
    Cointelegraph. n.d. What Is Augmented Reality and Why Is It Important for the Metaverse? Retrieved September 11, 2022 from https://cointelegraph.com/explained/what-is-augmented-reality-and-why-is-it-important-for-the-metaverse
    [11]
    Kemal Gökhan Nalbant and Şevval Uyanik. 2021. Computer vision in the Metaverse. Journal of Metaverse 1, 1 (2021), 9–12.
    [12]
    Aruna Pattam. 2022. The Intersection of Metaverse and AI: How AI Can Help Deliver Metaverse Promises? Retrieved September 11, 2022 from https://www.hcltech.com/blogs/intersection-metaverse-and-ai-how-ai-can-help-deliver-metaverse-promises
    [13]
    Qinglin Yang, Yetong Zhao, Huawei Huang, Zehui Xiong, Jiawen Kang, and Zibin Zheng. 2022. Fusing blockchain and AI with Metaverse: A survey. IEEE Open Journal of the Computer Society 3 (2022), 122–136.
    [14]
    Thien Huynh-The, Quoc-Viet Pham, Xuan-Qui Pham, Thanh Thi Nguyen, Zhu Han, and Dong-Seong Kim. 2023. Artificial intelligence for the Metaverse: A survey. Engineering Applications of Artificial Intelligence 117 (2023), 105581.
    [15]
    IEEE. 2022. The First IEEE International Workshop on Communications in Digital Twins and Metaverse. Retrieved November 21, 2022 from http://commetaverse.site/
    [16]
    Yijing Lin, Hongyang Du, Dusit Niyato, Jiangtian Nie, Jiayi Zhang, Yanyu Cheng, and Zhaohui Yang. 2023. Blockchain-aided secure semantic communication for AI-generated content in Metaverse. IEEE Open Journal of the Computer Society 4 (2023), 72–83.
    [17]
    Hamed Taherdoost. 2023. Blockchain and machine learning: A critical review on security. Information 14, 5 (2023), 295.
    [18]
    Yue Han, Dusit Niyato, Cyril Leung, Chunyan Miao, and Dong In Kim. 2022. A dynamic resource allocation framework for synchronizing Metaverse with IoT service and data. In Proceedings of the IEEE International Conference on Communications (ICC’22). IEEE, 1196–1201.
    [19]
    Abdenacer Naouri, Hangxing Wu, Nabil Abdelkader Nouri, Sahraoui Dhelim, and Huansheng Ning. 2021. A novel framework for mobile-edge computing by optimizing task offloading. IEEE Internet of Things Journal 8, 16 (2021), 13065–13076.
    [20]
    Pengfei Hu, Sahraoui Dhelim, Huansheng Ning, and Tie Qiu. 2017. Survey on fog computing: Architecture, key technologies, applications and open issues. Journal of Network and Computer Applications 98 (2017), 27–42.
    [21]
    Sahraoui Dhelim, Tahar Kechadi, Liming Chen, Nyothiri Aung, Huansheng Ning, and Luigi Atzori. 2022. Edge-enabled Metaverse: The convergence of Metaverse and mobile edge computing. arXiv preprint arXiv:2205.02764 (2022).
    [22]
    Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, and Chen Wang. 2019. Wireless sensing for human activity: A survey. IEEE Communications Surveys & Tutorials 22, 3 (2019), 1629–1645.
    [23]
    Yuanhao Cui, Fan Liu, Xiaojun Jing, and Junsheng Mu. 2021. Integrating sensing and communications for ubiquitous IoT: Applications, trends, and challenges. IEEE Network 35, 5 (2021), 158–167.
    [24]
    An Liu, Zhe Huang, Min Li, Yubo Wan, Wenrui Li, Tony Xiao Han, Chenchen Liu, Rui Du, Danny Kai Pin Tan, Jianmin Lu, Yuan Shen, Fabiola Colone, and Kevin Chetty. 2022. A survey on fundamental limits of integrated sensing and communication. IEEE Communications Surveys & Tutorials 24, 2 (2022), 994–1034.
    [25]
    Dhanashree Shukla and Sudhir D. Sawarkar. 2022. A study of wireless network evolution from 4G to 5G: Standalone vs non-standalone. In Proceedings of the 2022 International Conference on Smart Generation Computing, Communication, and Networking (SMART GENCON’22). 1–6. DOI:
    [26]
    IEEE. 2022. Cloud Computing, 5G, Metaverse, Electric Vehicles among the Most Important Areas of Technology in 2023, Says New IEEE Study. Retrieved November 18, 2022 from https://www.ieee.org/about/news/2022/news-release-2022-survey-results.html
    [27]
    Sunil David. 2022. Why 6G is essential to bring the Metaverse vision into fruition. ETTelecom. Retrieved November 18, 2022 from https://telecom.economictimes.indiatimes.com/news/why-6g-is-essential-to-bring-the-metaverse-vision-into-fruition/93591820
    [28]
    Fengxiao Tang, Xuehan Chen, Ming Zhao, and Nei Kato. 2022. The roadmap of communication and networking in 6G for the Metaverse. IEEE Wireless Communications. Published Online, June 24, 2022.
    [29]
    Muhammad Zawish, Fayaz Ali Dharejo, Sunder Ali Khowaja, Kapal Dev, Steven Davy, Nawab Muhammad Faseeh Qureshi, and Paolo Bellavista. 2022. AI and 6G into the Metaverse: Fundamentals, challenges and future research trends. arXiv preprint arXiv:2208.10921 (2022).
    [30]
    Walid Saad, Mehdi Bennis, and Mingzhe Chen. 2019. A vision of 6G wireless systems: Applications, trends, technologies, and open research problems. IEEE Network 34, 3 (2019), 134–142.
    [31]
    Trung Q. Duong, Dang Van Huynh, Saeed R. Khosravirad, Vishal Sharma, Octavia A. Dobre, and Hyundong Shin. 2023. From digital twin to Metaverse: The role of 6G ultra-reliable and low-latency communications with multi-tier computing. IEEE Wireless Communications 30, 3 (2023), 140–146.
    [32]
    Hootsuite. n.d. Avatar. Retrieved September 11, 2022 from https://blog.hootsuite.com/social-media-definitions/avatar/
    [33]
    Metamandrill. n.d. Metaverse Avatar Guide; Embody Yourself in the Metaverse. Retrieved September 11, 2022 from https://metamandrill.com/metaverse-avatar/
    [34]
    Falon Fatemi. 2022. The Metaverse Will Radically Change Content Creation Forever. Retrieved September 17, 2022 from https://www.forbes.com/sites/falonfatemi/2022/03/07/the-metaverse-will-radically-change-content-creation-forever/?sh=7938c2784a7f
    [35]
    Shu-Ching Chen. 2022. Multimedia research toward the Metaverse. IEEE MultiMedia 29, 1 (2022), 125–127.
    [36]
    Ben Mildenhall, Pratul P. Srinivasan, Matthew Tancik, Jonathan T. Barron, Ravi Ramamoorthi, and Ren Ng. 2021. NeRF: Representing scenes as neural radiance fields for view synthesis. Communications of the ACM 65, 1 (2021), 99–106.
    [37]
    Financial Times. n.d. NFTs: The Metaverse economy. Retrieved September 18, 2022 from https://www.ft.com/partnercontent/crypto-com/nfts-the-metaverse-economy.html
    [38]
    Calkin S. Montero, Jason Alexander, Mark T. Marshall, and Sriram Subramanian. 2010. Would you do that? Understanding social acceptance of gestural interfaces. In Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. 275–278.
    [39]
    Giluk Kang, Jahoon Koo, and Young-Gab Kim. 2023. Security and privacy requirements for the Metaverse: A Metaverse applications perspective. IEEE Communications Magazine. Published Online, May 8, 2023.
    [40]
    Mona M. Soliman, Ashraf Darwish, and Aboul Ella Hassanien. 2023. The threat of the digital human in the Metaverse: Security and privacy. In The Future of Metaverse in the Virtual Era and Physical World. Springer, 247–265.
    [41]
    Ben Falchuk, Shoshana Loeb, and Ralph Neff. 2018. The social Metaverse: Battle for privacy. IEEE Technology and Society Magazine 37, 2 (2018), 52–61.
    [42]
    Peter Snyder, Periwinkle Doerfler, Chris Kanich, and Damon McCoy. 2017. Fifteen minutes of unwanted fame: Detecting and characterizing doxing. In Proceedings of the 2017 Internet Measurement Conference. 432–444.
    [43]
    Jiliang Tang and Huan Liu. 2015. Trust in social media. Synthesis Lectures on Information Security, Privacy, & Trust 10, 1 (2015), 1–129.
    [44]
    Tiffany Xingyu Wang and Mark DeLoura. 2022. Trust and Safety in the Metaverse. Retrieved September 18, 2022 from https://cesium.com/open-metaverse-podcast/trust-and-safety-in-the-metaverse/
    [45]
    GRAND.SPACE. 2022. In the Metaverse, Blockchain Will Be the Foundation of Trust. Retrieved September 18, 2022 from https://thegrand.space/blockchain-will-be-the-foundation-of-trust-in-metaverse/
    [46]
    John Radoff. 2021. When the Virtual Became Real. Retrieved September 18, 2022 from https://medium.com/building-the-metaverse/when-the-virtual-became-real-4168809879f5
    [47]
    HuanSheng Ning and Hong Liu. 2015. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Science China Information Sciences 58, 3 (2015), 1–19.
    [48]
    Thien Huynh-The, Quoc-Viet Pham, Xuan-Qui Pham, Thanh Thi Nguyen, Zhu Han, and Dong-Seong Kim. 2022. Artificial intelligence for the Metaverse: A survey. arXiv e-prints arXiv:2202.10336 (2022).
    [49]
    Yuntao Wang, Zhou Su, Ning Zhang, Dongxiao Liu, Rui Xing, Tom H. Luan, and Xuemin Shen. 2022. A survey on Metaverse: Fundamentals, security, and privacy. arXiv preprint arXiv:2203.02662 (2022).
    [50]
    Mark Wright, Henrik Ekeus, Richard Coyne, James Stewart, Penny Travlou, and Robin Williams. 2008. Augmented duality: Overlapping a Metaverse with the real world. In Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology. 263–266.
    [51]
    Eliane Schlemmer, Daiana Trein, and Cristofer Oliveira. 2009. The Metaverse: Telepresence in 3D avatar-driven digital-virtual worlds. @tic.revista d’innovació educativa2 (2009), 26–32.
    [52]
    Christopher Jaynes, Williams B. Seales, Kenneth Calvert, Zongming Fei, and Jim Griffioen. 2003. The Metaverse: A networked collection of inexpensive, self-configuring, immersive environments. In Proceedings of the 2003 Workshop on Virtual Environments. 115–124.
    [53]
    Cory Ondrejka. 2004. Escaping the gilded cage: User created content and building the Metaverse. NYLS Law Review 49 (2004), 81.
    [54]
    Dawn Owens, Alanah Mitchell, Deepak Khazanchi, and Ilze Zigurs. 2011. An empirical investigation of virtual world projects and Metaverse technology capabilities. ACM SIGMIS Database: The DATABASE for Advances in Information Systems 42, 1 (2011), 74–101.
    [55]
    Haihan Duan, Jiaye Li, Sizheng Fan, Zhonghao Lin, Xiao Wu, and Wei Cai. 2021. Metaverse for social good: A university campus prototype. In Proceedings of the 29th ACM International Conference on Multimedia. 153–161.
    [56]
    Amina Almarzouqi, Ahmad Aburayya, and Said A. Salloum. 2022. Prediction of user’s intention to use Metaverse system in medical education: A hybrid SEM-ML learning approach. IEEE Access 10 (2022), 43421–43434.
    [57]
    Roberto Di Pietro and Stefano Cresci. 2021. Metaverse: Security and privacy issues. In Proceedings of the 2021 3rd IEEE International Conference on Trust, Privacy, and Security in Intelligent Systems and Applications (TPS-ISA’21). IEEE, 281–288.
    [58]
    Huansheng Ning, Hang Wang, Yujia Lin, Wenxi Wang, Sahraoui Dhelim, Fadi Farha, Jianguo Ding, and Mahmoud Daneshmand. 2023. A survey on the Metaverse: The state-of-the-art, technologies, applications, and challenges. IEEE Internet of Things Journal 10, 16 (2023), 14671–14688.
    [59]
    Abhimanyu S. Ahuja, Bryce W. Polascik, Divyesh Doddapaneni, Eamonn S. Byrnes, and Jayanth Sridhar. 2023. The digital Metaverse: Applications in artificial intelligence, medical education, and integrative health. Integrative Medicine Research 12, 1 (2023), 100917.
    [60]
    Yuntao Wang, Zhou Su, and Miao Yan. 2023. Social Metaverse: Challenges and solutions. arXiv preprint arXiv:2301.10221 (2023).
    [61]
    Rajeswari Chengoden, Nancy Victor, Thien Huynh-The, Gokul Yenduri, Rutvij H. Jhaveri, Mamoun Alazab, Sweta Bhattacharya, Pawan Hegde, Praveen Kumar Reddy Maddikunta, and Thippa Reddy Gadekallu. 2023. Metaverse for healthcare: A survey on potential applications, challenges and future directions. IEEE Access 11 (2023). 12765–12795.
    [62]
    Sikandar Ali, Abdullah, Tagne Poupi Theodore Armand, Ali Athar, Ali Hussain, Maisam Ali, Muhammad Yaseen, Moon-Il Joo, and Hee-Cheol Kim. 2023. Metaverse in healthcare integrated with Explainable AI and blockchain: Enabling immersiveness, ensuring trust, and providing patient data security. Sensors 23, 2 (2023), 565.
    [63]
    Pronaya Bhattacharya, Ashwin Verma, Vivek Kumar Prasad, Sudeep Tanwar, Bharat Bhushan, Bogdan Cristian Florea, Dragos Daniel Taralunga, Fayez Alqahtani, and Amr Tolba. 2023. Game-o-Meta: Trusted federated learning scheme for P2P gaming Metaverse beyond 5G networks. Sensors 23, 9 (2023), 4201.
    [64]
    Shahab S. Band, Sina Ardabili, Mehdi Sookhak, Anthony Theodore Chronopoulos, Said Elnaffar, Massoud Moslehpour, Mako Csaba, Bernat Torok, Hao-Ting Pai, and Amir Mosavi. 2022. When smart cities get smarter via machine learning: An in-depth literature review. IEEE Access 10 (2022), 60985–61015.
    [65]
    Varun Kohli, Utkarsh Tripathi, Vinay Chamola, Bijay Kumar Rout, and Salil S. Kanhere. 2022. A review on virtual reality and augmented reality use-cases of brain computer interface based applications for smart cities. Microprocessors and Microsystems 88 (2022), 104392.
    [66]
    Gordana Zeba, Marina Dabić, Mirjana Čičak, and Tugrul Daim. 2020. Artificial intelligence in manufacturing: Bibliometric and content analysis. In Proceedings of the 2020 IEEE/ITU International Conference on Artificial Intelligence for Good (AI4G’20). IEEE, 95–100.
    [67]
    Moslem Azamfar, Xiang Li, and Jay Lee. 2020. Deep learning-based domain adaptation method for fault diagnosis in semiconductor manufacturing. IEEE Transactions on Semiconductor Manufacturing 33, 3 (2020), 445–453.
    [68]
    Zhiyu Lin, Peng Xiangli, Zhi Li, Fuhe Liang, and Aofei Li. 2022. Towards Metaverse manufacturing: A blockchain-based trusted collaborative governance system. In Proceedings of the 2022 4th International Conference on Blockchain Technology. 171–177.
    [69]
    IEEE. n.d. IEEE Special Issue on Metaverse and the Future of Education. Retrieved December 9, 2022 from https://ieee-edusociety.org/ieee-special-issue-metaverse-and-future-education
    [70]
    Jinping Zhong and Yunxiang Zheng. 2022. Empowering future education: Learning in the Edu-Metaverse. In Proceedings of the 2022 International Symposium on Educational Technology (ISET’22). IEEE, 292–295.
    [71]
    Emily Hedrick, Michael Harper, Eric Oliver, and Daniel Hatch. 2022. Teaching & learning in virtual reality: Metaverse classroom exploration. In Proceedings of the 2022 Conference on Intermountain Engineering, Technology, and Computing (IETC’22). IEEE, 1–5.
    [72]
    Qifen Zhang. 2023. Secure preschool education using machine learning and Metaverse technologies. Applied Artificial Intelligence 37, 1 (2023), 2222496.
    [73]
    Antier. n.d. Why the Military Needs a Metaverse. Retrieved December 30, 2022 from https://www.antiersolutions.com/why-the-military-needs-a-metaverse
    [74]
    Anusuya Datta. 2022. What Is Military Metaverse and How Is It Different from Commercial Metaverse. Retrieved December 30, 2022 from https://www.geospatialworld.net/prime/interviews/what-is-military-metaverse-and-how-is-it-different-from-commercial-metaverse/
    [75]
    Thien Huynh-The, Quoc-Viet Pham, Xuan-Qui Pham, Thanh Thi Nguyen, Zhu Han, and Dong-Seong Kim. 2022. Artificial intelligence for the Metaverse: A survey. arXiv preprint arXiv:2202.10336 (2022).
    [76]
    Roman V. Yampolskiy, Brendan Klare, and Anil K. Jain. 2012. Face recognition in the virtual world: Recognizing avatar faces. In Proceedings of the 2012 11th International Conference on Machine Learning and Applications, Vol. 1. IEEE, 40–45.
    [77]
    Aitor Rovira and Mel Slater. 2017. Reinforcement learning as a tool to make people move to a specific location in immersive virtual reality. International Journal of Human-Computer Studies 98 (2017), 89–94.
    [78]
    Iason Kastanis and Mel Slater. 2012. Reinforcement learning utilizes proxemics: An avatar learns to manipulate the position of people in immersive virtual reality. ACM Transactions on Applied Perception 9, 1 (2012), 1–15.
    [79]
    Carlos Menendez. 2022. The Metaverse: Driven by AI, along with the Old Fashioned Kind of Intelligence. Retrieved October 24, 2022 from https://www.forbes.com/sites/forbestechcouncil/2022/04/18/the-metaverse-driven-by-ai-along-with-the-old-fashioned-kind-of-intelligence/?sh=2b85b2441b36
    [80]
    Ben Goertzel. 2022. AI will help realize the true vision the Metaverse hopes to achieve. Cointelegraph. Retrieved October 24, 2022 from https://cointelegraph.com/news/ai-will-help-realize-the-true-vision-the-metaverse-hopes-to-achieve
    [81]
    Pragya Soni. 2022. 6 Use Cases of AI in Metaverse. Retrieved October 25, 2022 from https://analyticssteps.com/blogs/6-use-cases-ai-metaverse
    [82]
    Merylin Monaro, Emilia Barakova, and Nicol Navarin. 2022. Editorial special issue interaction with artificial intelligence systems: New human-centered perspectives and challenges. IEEE Transactions on Human-Machine Systems 52, 3 (2022), 326–331.
    [83]
    Nitesh Khadka, Mir Ragib Ishraq, Asif Mohammed Samir, and Mohammad Shahidur Rahman. 2019. Multilingual text categorization of Indo-Aryan languages. In Proceedings of the 2019 International Conference on Electrical, Computer, and Communication Engineering (ECCE’19). IEEE, 1–5.
    [84]
    Ramprakash Ramamoorthy. 2022. Why the Metaverse is filled with security, privacy and safety issues. VentureBeat. Retrieved October 17, 2022 from https://venturebeat.com/security/why-the-metaverse-is-filled-with-security-privacy-and-safety-issues/
    [85]
    Mohammad Alja’afreh, Ranwa Al Mallah, Ali Karime, and Abdulmotaleb El Saddik. 2023. Cybersecurity in the Metaverse: Challenges and approaches. In Proceedings of the 2023 International Conference on Intelligent Metaverse Technologies and Applications (iMETA’23). IEEE, 1–8.
    [86]
    Ruoyu Zhao, Yushu Zhang, Youwen Zhu, Rushi Lan, and Zhongyun Hua. 2022. Metaverse: Security and privacy concerns. arXiv preprint arXiv:2203.03854 (2022).
    [87]
    Mahbuba Begum and Mohammad Shorif Uddin. 2020. Digital image watermarking techniques: A review. Information 11, 2 (2020), 110.
    [88]
    Hong-Ning Dai, Zibin Zheng, and Yan Zhang. 2019. Blockchain for Internet of Things: A survey. IEEE Internet of Things Journal 6, 5 (2019), 8076–8094.
    [89]
    Danny Palmer. 2022. The Metaverse is coming, and the security threats have already arrived. ZDNET. Retrieved October 20, 2022 from https://www.zdnet.com/article/the-metaverse-is-coming-and-the-security-threats-have-already-arrived/
    [90]
    Martínez Torres, Javier, Carla Iglesias Comesaña, and Paulino J. García-Nieto. 2019. Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics 10.10 (2019), 2823–2836.
    [91]
    Balbix. n.d. Using Artificial Intelligence in Cybersecurity. Retrieved November 6, 2022 from https://www.balbix.com/insights/artificial-intelligence-in-cybersecurity/
    [92]
    Akhilesh Deshmukh and Eleanor Barlow. 2020. Debunking the Myths. How Machine Learning (ML) Benefits Cyber Security. Retrieved November 6, 2022 from https://www.securityhq.com/blog/debunking-the-myths-how-machine-learning-ml-benefits-cyber-security/
    [93]
    Zhimin Zhang, Huansheng Ning, Feifei Shi, Fadi Farha, Yang Xu, Jiabo Xu, Fan Zhang, and Kim-Kwang Raymond Choo. 2021. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artificial Intelligence Review 55 (2021), 1029–1053.
    [94]
    Rabie Ahmed, Taoufik Saidani, and Malek Rababa. 2021. A parallel genetic algorithm for solving deadlock problem within multi-unit resources systems. International Journal of Computer Science & Network Security 21, 12 (2021), 175–182.
    [95]
    Abu Jafar Md. Muzahid, Syafiq Fauzi Kamarulzaman, Md. Arafatur Rahman, and Ali H. Alenezi. 2022. Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles. IEEE Access 10 (2022), 43303–43319.
    [96]
    Cynet. n.d. Network Attacks and Network Security Threats. Retrieved October 27, 2022 from https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/
    [97]
    Reddy Saisindhutheja and Gopal K. Shyam. 2022. A machine learning based attack detection and mitigation using a secure SaaS framework. Journal of King Saud University–Computer and Information Sciences 34, 7 (2022), 4047–4061.
    [98]
    Nitesh Bharot, Priyanka Verma, Sangeeta Sharma, and Veenadhari Suraparaju. 2018. Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arabian Journal for Science and Engineering 43, 2 (2018), 959–967.
    [99]
    Aqeel Sahi, David Lai, Yan Li, and Mohammed Diykh. 2017. An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5 (2017), 6036–6048.
    [100]
    Fatima Khashab, Joanna Moubarak, Antoine Feghali, and Carole Bassil. 2021. DDoS attack detection and mitigation in SDN using machine learning. In Proceedings of the 2021 IEEE 7th International Conference on Network Softwarization (NetSoft’21). IEEE, 395–401.
    [101]
    Marinos Dimolianis, Adam Pavlidis, and Vasilis Maglaris. 2021. SYN flood attack detection and mitigation using machine learning traffic classification and programmable data plane filtering. In Proceedings of the 2021 24th Conference on Innovation in Clouds, Internet, and Networks (ICIN’21). IEEE, 126–133.
    [102]
    M. O. W. Grond, N. H. Luong, J. Morren, and J. G. Slootweg. 2012. Multi-objective optimization techniques and applications in electric power systems. In Proceedings of the 2012 47th International Universities Power Engineering Conference (UPEC’12). IEEE, 1–6.
    [103]
    Yazan Otoum, Sai Krishna Yadlapalli, and Amiya Nayak. 2022. FTLIoT: A federated transfer learning framework for securing IoT. In Proceedings of the 2022 IEEE Global Communications Conference(GLOBECOM’22). IEEE, 1146–1151.
    [104]
    IGI Global. n.d. What Is Attack vs. Intrusion. Retrieved October 29, 2022 from https://www.igi-global.com/dictionary/attack-vs-intrusion/1751
    [105]
    Shu-Yu Kuo, Fan-Hsun Tseng, and Yao-Hsin Chou. 2023. Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism. Future Generation Computer Systems 143 (2023), 179–190.
    [106]
    Fekadu Yihunie, Eman Abdelfattah, and Amish Regmi. 2019. Applying machine learning to anomaly-based intrusion detection systems. In Proceedings of the 2019 IEEE Long Island Systems, Applications, and Technology Conference (LISAT’19). IEEE, 1–5.
    [107]
    Jiong Zhang and Mohammad Zulkernine. 2006. Anomaly based network intrusion detection with unsupervised outlier detection. In Proceedings of the 2006 IEEE International Conference on Communications, Vol. 5. IEEE, 2388–2393.
    [108]
    Emrah Tufan, Cihangir Tezcan, and Cengiz Acartürk. 2021. Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network. IEEE Access 9 (2021), 50078–50092.
    [109]
    Tushar Rakshe and Vishal Gonjari. 2017. Anomaly based network intrusion detection using machine learning techniques. International Journal of Engineering Research and Technology 6, 5 (2017), 216–220.
    [110]
    Muaadh A. Alsoufi, Shukor Razak, Maheyzah Md. Siraj, Ibtehal Nafea, Fuad A. Ghaleb, Faisal Saeed, and Maged Nasser. 2020. Anomaly intrusion detection systems in IoT using deep learning techniques: A survey. In Proceedings of the International Conference of Reliable Information and Communication Technology. 659–675.
    [111]
    N. Satheesh, M. V. Rathnamma, G. Rajeshkumar, P Vidya Sagar, Pankaj Dadheech, S. R. Dogiwal, Priya Velayutham, and Sudhakar Sengan. 2020. Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network. Microprocessors and Microsystems 79 (2020), 103285.
    [112]
    Khaled Alrawashdeh and Carla Purdy. 2016. Toward an online anomaly intrusion detection system based on deep learning. In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA’16). IEEE, 195–200.
    [113]
    Aneri Barevadia. 2022. Malware is a growing threat to IoT devices—Find out how to protect your device! Infochips. Retrieved October 30, 2022 from https://www.einfochips.com/blog/malware-is-a-growing-threat-to-iot-devices-find-out-how-to-protect-your-device/
    [114]
    Anshuman Dash, Satyajit Pal, and Chinmay Hegde. 2018. Ransomware auto-detection in IoT devices using machine learning. In Proceedings of the 6th International Conference on Business Analytics and Intelligence (ICBAI’18).
    [115]
    Rajesh Kumar, Xiaosong Zhang, Wenyong Wang, Riaz Ullah Khan, Jay Kumar, and Abubakar Sharif. 2019. A multimodal malware detection technique for Android IoT devices using various features. IEEE Access 7 (2019), 64411–64430.
    [116]
    M. Shobana and S. Poonkuzhali. 2020. A novel approach to detect IoT malware by system calls using deep learning techniques. In Proceedings of the 2020 International Conference on Innovative Trends in Information Technology (ICITIIT’20). IEEE, 1–5.
    [117]
    Nisais Nimalasingam, Janaka Senanayake, and Chathura Rajapakse. 2022. Detection of IoT malware based on forensic analysis of network traffic features. In Proceedings of the 2022 International Research Conference on Smart Computing and Systems Engineering (SCSE’22), Vol. 5. IEEE, 122–130.
    [118]
    Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, and Muhaiminul Islam Adnan. 2022. Ransomware classification and detection with machine learning algorithms. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC’22). IEEE, 0316–0322.
    [119]
    GitHub. n.d. Ransomware Detection Using Machine Learning. Retrieved October 30, 2022 from https://github.com/muditmathur2020/RansomwareDetection
    [120]
    Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, and Muhammad Shafique. 2018. Security for machine learning-based systems: Attacks and challenges during training and inference. In Proceedings of the 2018 International Conference on Frontiers of Information Technology (FIT’18). IEEE, 327–332.
    [121]
    Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In Proceedings of the International Conference on Machine Learning. 201–210.
    [122]
    Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1528–1540.
    [123]
    Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. CryptoDL: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017).
    [124]
    Francisco-Javier González-Serrano, Adrián Amor-Martín, and Jorge Casamayón-Antón. 2018. Supervised machine learning using encrypted training data. International Journal of Information Security 17, 4 (2018), 365–377.
    [125]
    Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. ImageNet: A large-scale hierarchical image database. In Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 248–255.
    [126]
    Tong Li, Zhengan Huang, Ping Li, Zheli Liu, and Chunfu Jia. 2018. Outsourced privacy-preserving classification service over encrypted data. Journal of Network and Computer Applications 106 (2018), 100–110.
    [127]
    Divya Gopinath, Guy Katz, Corina S. Pasareanu, and Clark Barrett. 2017. DeepSafe: A data-driven approach for checking adversarial robustness in neural networks. arXiv preprint arXiv:1710.00486 (2017).
    [128]
    Xiaowei Huang, Marta Kwiatkowska, Sen Wang, and Min Wu. 2017. Safety verification of deep neural networks. In Proceedings of the International Conference on Computer Aided Verification. 3–29.
    [129]
    Ishai Rosenberg, Guillaume Sicard, and Eli Omid David. 2017. DeepAPT: Nation-state APT attribution using end-to-end deep neural networks. In Proceedings of the International Conference on Artificial Neural Networks. 91–99.
    [130]
    Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, and Yang Yang. 2018. Privacy-preserving outsourced support vector machine design for secure drug discovery. IEEE Transactions on Cloud Computing 8, 2 (2018), 610–622.
    [131]
    Jiayang Wu, Wensheng Gan, Zefeng Chen, Shicheng Wan, and Hong Lin. 2023. AI-generated content (AIGC): A survey. arXiv preprint arXiv:2304.06632 (2023).
    [132]
    Zhihan Lv. 2023. Generative artificial intelligence in the Metaverse era. Cognitive Robotics 3 (2023), 208–217.
    [133]
    Y. Wang, Y. Pan, M. Yan, Z. Su, and T. H. Luan. 2023. A survey on ChatGPT: Ai-generated contents, challenges, and solutions. IEEE Open Journal of the Computer Society 4, 1 (Jan. 2023), 280–302. DOI:
    [134]
    Yazan Otoum, Vinay Chamola, and Amiya Nayak. 2022. Federated and transfer learning-empowered intrusion detection for IoT applications. IEEE Internet of Things Magazine 5, 3 (2022), 50–54.

    Index Terms

    1. Machine Learning in Metaverse Security: Current Solutions and Future Challenges

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 56, Issue 8
          August 2024
          963 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/3613627
          • Editors:
          • David Atienza,
          • Michela Milano
          Issue’s Table of Contents

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 26 April 2024
          Online AM: 28 March 2024
          Accepted: 07 March 2024
          Revised: 06 February 2024
          Received: 25 January 2023
          Published in CSUR Volume 56, Issue 8

          Check for updates

          Author Tags

          1. Metaverse Security
          2. Digital Twin
          3. Machine Learning
          4. Extended Reality
          5. Generative AI
          6. Blockchain

          Qualifiers

          • Survey

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 555
            Total Downloads
          • Downloads (Last 12 months)555
          • Downloads (Last 6 weeks)112
          Reflects downloads up to 26 Jul 2024

          Other Metrics

          Citations

          View Options

          Get Access

          Login options

          Full Access

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Full Text

          View this article in Full Text.

          Full Text

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media