CFP last date
20 January 2025
Reseach Article

Data Driven Approaches to Cybersecurity using Deep Learning

by Shreyas Anand
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 30
Year of Publication: 2024
Authors: Shreyas Anand
10.5120/ijca2024923844

Shreyas Anand . Data Driven Approaches to Cybersecurity using Deep Learning. International Journal of Computer Applications. 186, 30 ( Jul 2024), 24-32. DOI=10.5120/ijca2024923844

@article{ 10.5120/ijca2024923844,
author = { Shreyas Anand },
title = { Data Driven Approaches to Cybersecurity using Deep Learning },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2024 },
volume = { 186 },
number = { 30 },
month = { Jul },
year = { 2024 },
issn = { 0975-8887 },
pages = { 24-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number30/data-driven-approaches-to-cybersecurity-using-deep-learning/ },
doi = { 10.5120/ijca2024923844 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-07-26T23:00:35.478404+05:30
%A Shreyas Anand
%T Data Driven Approaches to Cybersecurity using Deep Learning
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 30
%P 24-32
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing complexity of cyber threats necessitates innovative approaches for pre-emptive defense mechanisms. This research paper focuses on the application of deep learning techniques as a critical tool for monitoring and preventing cyber-attacks. In the realm of cybersecurity, machine learning, and deep learning classification algorithms play pivotal roles in identifying system irregularities indicative of ongoing attacks. Six classification techniques were employed in this study, including traditional machine learning algorithms (Decision Tree, Random Forest, and Gradient Boosting) and advanced deep learning algorithms (Convolutional Neural Network [CNN], Long Short-Term Memory [LSTM], and LSTM plus CNN). Using metrics such as precision, accuracy, F1-score, and recall, their performance was evaluated on the widely used Kaggle dataset CSIC 2010 Web Application Attacks. The findings of the study reveal that the LSTM with CNN exhibits superior performance, showcasing its effectiveness in detecting and defending against diverse cyber threats. This study underscores the urgency and practical benefits of integrating deep learning into cybersecurity protocols to safeguard networks from external and internal threats.

References
  1. Seemma, P. S., Nandhini, S., and Sowmiya, M. (2018), “Overview of cyber security”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 7 No. 11, pp.125-128.
  2. Ervural, B. C., and Ervural, B. (2018), “Overview of cyber security in the industry 4.0 era”, In Industry 4.0: managing the digital transformation, pp.267-284.
  3. Chowdhury, A. (2016), “Recent cyber security attacks and their mitigation approaches–an overview”, In International conference on applications and techniques in information security, pp.54-65.
  4. El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., and Ranganathan, P. (2020), “Cybersecurity challenges in vehicular communications”, Vehicular Communications, Vol. 23.
  5. Kim, A., Park, M., and Lee, D. H. (2020), “AI-IDS: Application of deep learning to real-time Web intrusion detection”, IEEE Access, Vol. 8, pp.70245-70261.
  6. Vartouni, A. M., Kashi, S. S., and Teshnehlab, M. (2018), “An anomaly detection method to detect web attacks using stacked auto-encoder”. In 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), pp. 131-134.
  7. Betarte, G., Pardo, Á., and Martínez, R. (2018), “Web application attacks detection using machine learning techniques”, In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp.1065-1072.
  8. Tuan, T. A., Long, H. V., Kumar, R., Priyadarshini, I., and Son, N. T. K. (2019), “Performance evaluation of Botnet DDoS attack detection using machine learning”, Evolutionary Intelligence, pp.1-12.
  9. Anwer, M., Farooq, M. U., Khan, S. M., and Waseemullah, W. (2021), “Attack Detection in IoT using Machine Learning”, Engineering, Technology, and Applied Science Research, Vol. 11 No. 3, pp.7273- 7278.
  10. Su, T., Sun, H., Zhu, J., Wang, and Li, Y. (2020), “BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset”, IEEE Access, Vol. 8, pp.29575-29585.
  11. Xu, W., Jang-Jaccard, J., Singh, A., Wei, Y., and Sabrina, F. (2021), “Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset”, IEEE Access, Vol. 9, pp.140136- 140146.
  12. Kavitha, S., and Uma Maheswari, N. (2021), “Network Anomaly Detection for NSL-KDD Dataset Using Deep Learning”, Information Technology in Industry, Vol. 9 No. 2, pp.821-827.
  13. Ferriyan, A., Thamrin, A. H., Takeda, K., and Murai, J. (2021), “Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic”, Applied Sciences, Vol. 11 No. 17.
  14. Giménez, C. T., Villegas, A. P., and Marañón, G. Á. (2010), “HTTP data set CSIC 2010”, Information Security Institute of CSIC (Spanish Research National Council).
  15. Hancock, J. T., and Khoshgoftaar, T. M. (2020), “Survey on categorical data for neural networks”, Journal of Big Data, Vol. 7 No.1, pp.1-41.
  16. Pal, M. (2005). Random forest classifier for remote sensing classification. International journal of remote sensing, 26(1), 217-222.
  17. Farnaaz, N., & Jabbar, M. A. (2016). Random forest modeling for network intrusion detection system. Procedia Computer Science, 89, 213-217.
  18. Idhammad, M., Afdel, K., & Belouch, M. (2018). Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Security and Communication Networks, 2018.
  19. Kingsford, C., & Salzberg, S. L. (2008). What are decision trees? Nature Biotechnology, 26(9), 1011-1013.
  20. Quinlan, J. R. (1986). Induction of decision trees. Machine learning, 1(1), 81-106.
  21. De Ville, B. (2013). Decision trees. Wiley Interdisciplinary Reviews: Computational Statistics, 5(6), 448-455.
  22. Kotsiantis, S. B. (2013). Decision trees: a recent overview. Artificial Intelligence Review, 39(4), 261-283.
  23. Amor, N. B., Benferhat, S., & Elouedi, Z. (2004, March). Naive Bayes vs decision trees in intrusion detection systems. In Proceedings of the 2004 ACM symposium on Applied computing (pp. 420-424).
  24. Gers, F. A., Eck, D., and Schmidhuber, J. (2002), “Applying LSTM to time series predictable through time-window approaches”, In Neural Nets WIRN Vietri-01, pp.193-200.
Index Terms

Computer Science
Information Sciences

Keywords

Deep Learning Cybersecurity Long Short-Term Memory Decision Tree Random Forest Convolutional Neural Network