⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



Generative AI: For Cyber Based Fake Attacks Detection and Classification Using Deep Learing Techniques


Authors : Katikam Mahesh

Volume/Issue : Volume 11 - 2026, Issue 3 - March


Google Scholar : https://tinyurl.com/mrrnfhpz

Scribd : https://tinyurl.com/3ac8pjep

DOI : https://doi.org/10.38124/ijisrt/26mar858

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : With projections to rise from USD 2 billion in 2024 to USD 14.79 billion by 2034, the worldwide market for generative AI in cybersecurity is expanding quickly. Council for the Global Development of Skills (GSDC) .to save from various cyber-attacks need an effect technology to tackle it. In order to counter increasingly complex, automated threats that elude conventional detection techniques, generative artificial intelligence (GenAI) is crucial to current cybersecurity. By providing real-time anomaly detection, quick threat analysis, automatic vulnerability patching, and AI-driven phishing defines, it functions as a force multiplier and significantly improves security posture. Existing deep learning models such as ANN (Artificial Neural Network) and DNN (Deep neural networks).so to enhance performance of these with the help of Generative ai technique is GAN (Generative Adversarial Network) easy to detect fake and real images automatically

Keywords : ANN (Artificial Neural Network), Generative ai Technique is GAN (Generative Adversarial Network), Generative Artificial Intelligence (GenAI), Deep Neural Networks(DNN).

References :

  1. M.Sladic, V. Valeros, C. Catania, S. Garcia, LLM in the shell: generative honeypots, in: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE Computer Society, Los Alamitos, CA, USA, 2024, pp. 430–435, https://doi.org/10.1109/EuroSPW61312.2024.00054
  2. W. Tann, Y. Liu, J.H. Sim, C.M. Seah, E.-C. Chang, Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions, 2023 arXiv preprint arXiv:2308.10443.
  3. O.G. Lira, A. Marroquin, M.A. To, Harnessing the     advanced capabilities of LLM for adaptive intrusion detection systems, in: L. Barolli (Ed.), Advanced Informatio
  4. H. Lai, M. Nissim, A survey on automatic generation of figurative language: from rule-based systems to Large Language Models, ACM Comput. Surv. 56 (10) (2024) 1–34, https://doi.org/10.1145/3654795
  5. .A. Ferrag, M. Ndhlovu, N. Tihanyi, L.C. Cordeiro, M. Debbah, T. Lestable, N.S. Thandi, Revolutionizing cyber threat detection with Large Language Models: a privacy-preserving BERT-based lightweight model for IoT/IIoT devices, IEEE Access 12 (2024) 23733–23750,https://doi.org/10.1109/ACCESS.2024.3363469
  6. Z. Liu, A review of advancements and applications of  Pre-Trained Language Models in cybersecurity, in: 2024 12th International Symposium on Digital Forensics and Security (ISDFS), 2024, pp. 1–10, https://doi.org/10.1109/ ISDFS60797.2024.10527236.
  7. S. Jamal, H. Wimmer, I.H. Sarker, An improved transformer-based model for detecting phishing, spam and ham emails: a large language model approach. Security and Privacy, 2024 e402, https://doi.org/10.1002/spy2.402.
  8. A. Fan, B. Gok kaya, M. Harman, M. Lyubarskiy, S. Sengupta, S. Yoo, J.M. Zhang, Large Language models for software engineering: survey and open problems, in: 2023 IEEE/ACM International Conference on Software Engineering: Future of Software Engineering (ICSE-FoSE), IEEE Computer Society, Los Alamitos, CA, USA, 2023, pp. 31–53, https://doi.org/10.1109/ICSE-FoSE59343.2023.00008.
  9. J. Wu, W. Gan, Z. Chen, S. Wan, P.S. Yu, Multimodal Large Language Models: A Survey, 2023 arrive preprint arXiv:2311.13165.

With projections to rise from USD 2 billion in 2024 to USD 14.79 billion by 2034, the worldwide market for generative AI in cybersecurity is expanding quickly. Council for the Global Development of Skills (GSDC) .to save from various cyber-attacks need an effect technology to tackle it. In order to counter increasingly complex, automated threats that elude conventional detection techniques, generative artificial intelligence (GenAI) is crucial to current cybersecurity. By providing real-time anomaly detection, quick threat analysis, automatic vulnerability patching, and AI-driven phishing defines, it functions as a force multiplier and significantly improves security posture. Existing deep learning models such as ANN (Artificial Neural Network) and DNN (Deep neural networks).so to enhance performance of these with the help of Generative ai technique is GAN (Generative Adversarial Network) easy to detect fake and real images automatically

Keywords : ANN (Artificial Neural Network), Generative ai Technique is GAN (Generative Adversarial Network), Generative Artificial Intelligence (GenAI), Deep Neural Networks(DNN).

Paper Submission Last Date
31 - March - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe