Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study

Barik, Kousik and Misra, Sanjay and Konar, Karabi and Fernandez-Sanz, Luis and Koyuncu, Murat (2022) Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study. Applied Artificial Intelligence, 36 (1). ISSN 0883-9514

[thumbnail of Cybersecurity Deep Approaches Attacks Dataset and Comparative Study.pdf] Text
Cybersecurity Deep Approaches Attacks Dataset and Comparative Study.pdf - Published Version

Download (9MB)

Abstract

Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked well in solving large-scale cybersecurity problems, an emerging concept of deep learning (DL) that caught on during this period caused information security specialists to improvise the result. The deep learning techniques analyzed in this study are convolution neural networks, recurrent neural networks, and deep neural networks in the context of cybersecurity.A framework is proposed, and a real-time laboratory setup is performed to capture network packets and examine this captured data using various DL techniques. A comparable interpretation is presented under the DL techniques with essential parameters, particularly accuracy, false alarm rate, precision, and detection rate. The DL techniques experimental output projects improvise the performance of various real-time cybersecurity applications on a real-time dataset. CNN model provides the highest accuracy of 98.64% with a precision of 98% with binary class. The RNN model offers the second-highest accuracy of 97.75%. CNN model provides the highest accuracy of 98.42 with multiclass class. The study shows that DL techniques can be effectively used in cybersecurity applications. Future research areas are being elaborated, including the potential research topics to improve several DL methodologies for cybersecurity applications.

Item Type: Article
Subjects: STM Open Library > Computer Science
Depositing User: Unnamed user with email support@stmopenlibrary.com
Date Deposited: 15 Jun 2023 06:49
Last Modified: 18 Mar 2024 04:34
URI: http://ebooks.netkumar1.in/id/eprint/1680

Actions (login required)

View Item
View Item