Using Deep Learning Algorithm in Security Informatics


Authors : Rachid Tahril; Abdellatif Lasbahani; Abdessamad Jarrar; Youssef Balouki

Volume/Issue : Volume 9 - 2024, Issue 4 - April


Google Scholar : https://tinyurl.com/2v3hyszz

Scribd : https://tinyurl.com/3a583jan

DOI : https://doi.org/10.38124/ijisrt/IJISRT24APR2271

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The utilization of deep learning algorithms in security informatics has revolutionized cybersecurity, offering advanced solutions for threat detection and mitigation. This paper presents findings from research exploring the efficacy of deep learning in various security domains, including anomaly detection, malware detection, phishing detection, and threat intelligence analysis. Results demonstrate high detection rates and accuracy, with anomaly detection achieving a remarkable 98.5% detection rate and malware detection showcasing a classification accuracy of 99.2%. Phishing detection also yielded promising results with a detection accuracy of 95.8%. These findings underscore the potential of deep learning in enhancing security defenses. However, challenges such as interpretability and robustness remain, necessitating further research and development. By addressing these challenges and prioritizing robust security measures, organizations can leverage deep learning to create more effective and trustworthy security solutions, thereby mitigating cyber threats and safeguarding digital assets.

Keywords : Deep Learning, Security Informatics, Anomaly Detection, Malware Detection, Phishing Detection, Threat Intelligence Analysis, Cybersecurity, Interpretation, Robustness, Mitigation.

References :

  1. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150.
  2. Ahuja, V., and Vijayakumar, P. (2019). Detection of cyber-attacks in industrial control systems using deep learning techniques. International Journal of Critical Infrastructure Protection, 26, 18-30.
  3. Akhtar, N., & Mian, A. (2018). Threat of adversarial attacks on deep learning in computer vision: A survey. Ieee Access, 6, 14410-14430.
  4. Al Jallad, K., Aljnidi, M., & Desouki, M. S. (2019). Extensive data analysis and distributed deep learning for next-generation intrusion detection system optimization. Journal of Big Data, 6(1), 88.
  5. Alanezi, M. (2021). Phishing detection methods: A review.
  6. Alkahtani, H., & Aldhyani, T. H. (2021). An intrusion detection system advances the Internet of Things infrastructure-based deep learning algorithms. Complexity, 2021, 1-18.
  7. Arachchige, P. C. M. (2020). Scalable data perturbation for privacy-preserving large-scale data analytics and machine learning (Doctoral dissertation, RMIT University).
  8. Aslan, Ö., & Yilmaz, A. A. (2021). A new malware classification framework based on deep learning algorithms. Ieee Access, 9, 87936-87951.
  9. Aslan, Ömer, and Abdullah Asim Yilmaz. "A new malware classification framework based on deep learning algorithms." Ieee Access 9 (2021): 87936-87951.
  10. Chitradevi, D., & Prabha, S. (2020). Analysis of brain sub-regions using optimization techniques and deep learning method in Alzheimer's disease. Applied Soft Computing, 86, 105857.
  11. Dimiduk, D. M., Holm, E. A., & Niezgoda, S. R. (2018). Perspectives on the impact of machine learning, deep learning, and artificial intelligence on materials, processes, and structures engineering. Integrating Materials and Manufacturing Innovation, 7, 157-172.
  12. Do, N. Q., Selamat, A., Krejcar, O., Herrera-Viedma, E., & Fujita, H. (2022). Deep learning for phishing detection: Taxonomy, current challenges and future directions. Ieee Access, 10, 36429-36463.
  13. Gupta, C., Johri, I., Srinivasan, K., Hu, Y. C., Qaisar, S. M., & Huang, K. Y. (2022). A systematic review of machine learning and deep learning models for electronic information security in mobile networks. Sensors, 22(5), 2017.
  14. He, K., Kim, D. D., & Asghar, M. R. (2023). Adversarial machine learning for network intrusion detection systems: A comprehensive survey. IEEE Communications Surveys & Tutorials, 25(1), 538-566.
  15. Huang, H., Mu, J., Gong, N. Z., Li, Q., Liu, B., & Xu, M. (2021). Data poisoning attacks to deep learning-based recommender systems. arXiv preprint arXiv:2101.02644.
  16. Iezzi, M. (2020, December). Practical privacy-preserving data science with homomorphic encryption: an overview. In 2020 IEEE International Conference on Big Data (Big Data) (pp. 3979-3988). IEEE.
  17. Kasongo, S. M. (2023). A deep learning technique for intrusion detection using a Recurrent Neural Networks-based framework. Computer Communications, 199, 113-125.
  18. Ketkar, N., Moolayil, J., Ketkar, N., & Moolayil, J. (2021). Convolutional neural networks. Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch, 197-242.
  19. Kim, A., Park, M., & Lee, D. H. (2020). AI-IDS: Application of deep learning to real-time Web intrusion detection. IEEE Access, 8, 70245-70261.
  20. Koloveas, P., Chantzios, T., Alevizopoulou, S., Skiadopoulos, S., & Tryfonopoulos, C. (2021). Intime: A machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence. Electronics, 10(7), 818.
  21. Li, M., Jiang, Y., Zhang, Y., & Zhu, H. (2023). Medical image analysis using deep learning algorithms. Frontiers in Public Health, 11, 1273253.
  22. Lin, G., Wen, S., Han, Q. L., Zhang, J., & Xiang, Y. (2020). Software vulnerability detection using deep neural networks: a survey. Proceedings of the IEEE, 108(10), 1825-1848.
  23. Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences, 9(20), 4396.
  24. Luo, Y., Xiao, Y., Cheng, L., Peng, G., & Yao, D. (2021). Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities. ACM Computing Surveys (CSUR), 54(5), 1-36.
  25. Lv, Z., Qiao, L., Li, J., & Song, H. (2020). Deep-learning-enabled security issues in the Internet of Things. IEEE Internet of Things Journal, 8(12), 9531-9538.
  26. Mijwel, M. M. (2021). Artificial neural networks advantages and disadvantages. Mesopotamian Journal of Big Data, 2021, 29-31.
  27. Mireshghallah, F., Taram, M., Vepakomma, P., Singh, A., Raskar, R., & Esmaeilzadeh, H. (2020). Privacy in deep learning: A survey. arXiv preprint arXiv:2004.12254.
  28. Montesinos López, O. A., Montesinos López, A., & Crossa, J. (2022). Fundamentals of artificial neural networks and deep learning. In Multivariate statistical machine learning methods for genomic prediction (pp. 379-425). Cham: Springer International Publishing.
  29. Najafabadi, M. M., Villanustre, F., Khoshgoftaar, T. M., Seliya, N., Wald, R., & Muharemagic, E. (2015). Deep learning applications and challenges in big data analytics. Journal of big data, 2, 1-21.
  30. Naresh, V. S., Thamarai, M., & Allavarpu, V. D. (2023). Privacy-preserving deep learning in medical informatics: applications, challenges, and solutions. Artificial Intelligence Review, 56(Suppl 1), 1199-1241.
  31. Navidan, H., Moshiri, P. F., Nabati, M., Shahbazian, R., Ghorashi, S. A., Shah-Mansouri, V., & Windridge, D. (2021). Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation. Computer Networks, 194, 108149.
  32. Noor, U., Anwar, Z., Amjad, T., & Choo, K. K. R. (2019). A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Generation Computer Systems, 96, 227-242.
  33. Patibandla, R. L., Narayana, V. L., Gopi, A. P., & Rao, B. T. (2021). Comparative study on analysis of medical images using deep learning techniques. In Deep Learning for Biomedical Applications (pp. 329-345). CRC Press.
  34. Polyzotis, N., Zinkevich, M., Roy, S., Breck, E., & Whang, S. (2019). Data validation for machine learning. Proceedings of machine learning and systems, 1, 334-347.
  35. Schmidt, R. M. (2019). Recurrent neural networks (rnns): A gentle introduction and overview. arXiv preprint arXiv:1912.05911.
  36. Schneier, B. (2023). Artificial intelligence and security: The invisible hand. Journal of Cybersecurity, 9(1), tjab033.
  37. Schmidt, R. M. (2019). Recurrent neural networks (rnns): A gentle introduction and overview. arXiv preprint arXiv:1912.05911.
  38. Sen, J., Dutta, R., & Uddin, M. (2023). Evaluating the performance of deep learning in cyber-security applications: A systematic review. Computers & Security, 110, 102271.
  39. Sengar, S. S., Hariharan, U., & Rajkumar, K. (2020, March). Multimodal biometric authentication system using deep learning method. In 2020 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 309-312). IEEE.
  40. Shah, V. (2020). Advancements in Deep Learning for Natural Language Processing in Software Applications. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 4(3), 45-56.
  41. Shah, V. (2020). Advancements in Deep Learning for Natural Language Processing in Software Applications. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 4(3), 45-56.
  42. Sharma, N., Oriaku, E. A., & Oriaku, N. (2020). Cost and effects of data breaches, precautions, and disclosure laws. International Journal of Emerging Trends in Social Sciences, 8(1), 33-41.
  43. Sherstinsky, A. (2020). Fundamentals of recurrent neural networks (RNN) and long-short-term memory (LSTM) networks. Physica D: Nonlinear Phenomena, 404, 132306.
  44. Shrestha, A., & Mahmood, A. (2019). Review of deep learning algorithms and architectures. IEEE Access, 7, 53040-53065.
  45. Shabbir, J., & Anwer, T. (2018). Artificial intelligence and its role shortly. arXiv preprint arXiv:1804.01396.
  46. Wang, S., Ko, R. K., Bai, G., Dong, N., Choi, T., & Zhang, Y. (2023). Evasion Attack and Defense On Machine Learning Models in Cyber-Physical Systems: A Survey. IEEE Communications Surveys & Tutorials.
  47. Xu, Y., Liu, X., Cao, X., Huang, C., Liu, E., Qian, S., ... & Zhang, J. (2021). Artificial intelligence: A powerful paradigm for scientific research. The Innovation, 2(4).
  48. Yun, S., Jeong, M., Kim, R., Kang, J., & Kim, H. J. (2019). Graph transformer networks. Advances in neural information processing systems, 32.
  49. Zulfiqar, M., Syed, F., Khan, M. J., & Khurshid, K. (2019, July). Deep face recognition for biometric authentication. In 2019, there was an International Conference on Electrical, communication, and Computer Engineering (ICECCE) (pp. 1-6). IEEE.

The utilization of deep learning algorithms in security informatics has revolutionized cybersecurity, offering advanced solutions for threat detection and mitigation. This paper presents findings from research exploring the efficacy of deep learning in various security domains, including anomaly detection, malware detection, phishing detection, and threat intelligence analysis. Results demonstrate high detection rates and accuracy, with anomaly detection achieving a remarkable 98.5% detection rate and malware detection showcasing a classification accuracy of 99.2%. Phishing detection also yielded promising results with a detection accuracy of 95.8%. These findings underscore the potential of deep learning in enhancing security defenses. However, challenges such as interpretability and robustness remain, necessitating further research and development. By addressing these challenges and prioritizing robust security measures, organizations can leverage deep learning to create more effective and trustworthy security solutions, thereby mitigating cyber threats and safeguarding digital assets.

Keywords : Deep Learning, Security Informatics, Anomaly Detection, Malware Detection, Phishing Detection, Threat Intelligence Analysis, Cybersecurity, Interpretation, Robustness, Mitigation.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe