Vis enkel innførsel

dc.contributor.authorBarik, Kousik
dc.contributor.authorMisra, Sanjay
dc.contributor.authorKonar, Karabi
dc.contributor.authorFernandez-Sanz, Luis
dc.contributor.authorKoyuncu, Murat
dc.date.accessioned2022-12-14T17:21:43Z
dc.date.available2022-12-14T17:21:43Z
dc.date.created2022-04-04T11:59:12Z
dc.date.issued2022
dc.identifier.citationApplied Artificial Intelligence. 2022, 36 (1), Artikkel 2055399.en_US
dc.identifier.issn0883-9514
dc.identifier.urihttps://hdl.handle.net/11250/3037786
dc.description.abstractCyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked well in solving large-scale cybersecurity problems, an emerging concept of deep learning (DL) that caught on during this period caused information security specialists to improvise the result. The deep learning techniques analyzed in this study are convolution neural networks, recurrent neural networks, and deep neural networks in the context of cybersecurity.A framework is proposed, and a realtime laboratory setup is performed to capture network packets and examine this captured data using various DL techniques. A comparable interpretation is presented under the DL techniques with essential parameters, particularly accuracy, false alarm rate, precision, and detection rate. The DL techniques experimental output projects improvise the performance of various realtime cybersecurity applications on a real-time dataset. CNN model provides the highest accuracy of 98.64% with a precision of 98% with binary class. The RNN model offers the secondhighest accuracy of 97.75%. CNN model provides the highest accuracy of 98.42 with multiclass class. The study shows that DL techniques can be effectively used in cybersecurity applications. Future research areas are being elaborated, including the potential research topics to improve several DL methodologies for cybersecurity applications.en_US
dc.language.isoengen_US
dc.publisherTaylor & Francisen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleCybersecurity Deep: Approaches, Attacks Dataset, and Comparative Studyen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2022 The Author(s).en_US
dc.subject.nsiVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Datateknologi: 551en_US
dc.source.volume36en_US
dc.source.journalApplied Artificial Intelligenceen_US
dc.source.issue1en_US
dc.identifier.doi10.1080/08839514.2022.2055399
dc.identifier.cristin2015093
dc.source.articlenumber2055399en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal