Author:
Tahril Rachid,Lasbahani Abdellatif,Jarrar Abdessamad,Balouki Youssef
Abstract
The utilization of deep learning algorithms in security informatics has revolutionized cybersecurity, offering advanced solutions for threat detection and mitigation. This paper presents findings from research exploring the efficacy of deep learning in various security domains, including anomaly detection, malware detection, phishing detection, and threat intelligence analysis. Results demonstrate high detection rates and accuracy, with anomaly detection achieving a remarkable 98.5% detection rate and malware detection showcasing a classification accuracy of 99.2%. Phishing detection also yielded promising results with a detection accuracy of 95.8%. These findings underscore the potential of deep learning in enhancing security defenses. However, challenges such as interpretability and robustness remain, necessitating further research and development. By addressing these challenges and prioritizing robust security measures, organizations can leverage deep learning to create more effective and trustworthy security solutions, thereby mitigating cyber threats and safeguarding digital assets.
Publisher
International Journal of Innovative Science and Research Technology
Reference67 articles.
1. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150.
2. Ahuja, V., and Vijayakumar, P. (2019). Detection of cyber-attacks in industrial control systems using deep learning techniques. International Journal of Critical Infrastructure Protection, 26, 18-30.
3. Akhtar, N., & Mian, A. (2018). Threat of adversarial attacks on deep learning in computer vision: A survey. Ieee Access, 6, 14410-14430.
4. Al Jallad, K., Aljnidi, M., & Desouki, M. S. (2019). Extensive data analysis and distributed deep learning for next-generation intrusion detection system optimization. Journal of Big Data, 6(1), 88.
5. Alanezi, M. (2021). Phishing detection methods: A review.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Effect of Infiltration Rate on Flood Hazards in Gorontalo City;International Journal of Innovative Science and Research Technology (IJISRT);2024-05-28