dc.contributor.author | Barik, Kousik | |
dc.contributor.author | Misra, Sanjay | |
dc.contributor.author | Konar, Karabi | |
dc.contributor.author | Fernandez-Sanz, Luis | |
dc.contributor.author | Koyuncu, Murat | |
dc.date.accessioned | 2022-12-14T17:21:43Z | |
dc.date.available | 2022-12-14T17:21:43Z | |
dc.date.created | 2022-04-04T11:59:12Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Applied Artificial Intelligence. 2022, 36 (1), Artikkel 2055399. | en_US |
dc.identifier.issn | 0883-9514 | |
dc.identifier.uri | https://hdl.handle.net/11250/3037786 | |
dc.description.abstract | Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked well in solving large-scale cybersecurity problems, an emerging concept of deep learning (DL) that caught on during this period caused information security specialists to improvise the result. The deep learning techniques analyzed in this study are convolution neural networks, recurrent neural networks, and deep neural networks in the context of cybersecurity.A framework is proposed, and a realtime laboratory setup is performed to capture network packets and examine this captured data using various DL techniques. A comparable interpretation is presented under the DL techniques with essential parameters, particularly accuracy, false alarm rate, precision, and detection rate. The DL techniques experimental output projects improvise the performance of various realtime cybersecurity applications on a real-time dataset. CNN model provides the highest accuracy of 98.64% with a precision of 98% with binary class. The RNN model offers the secondhighest accuracy of 97.75%. CNN model provides the highest accuracy of 98.42 with multiclass class. The study shows that DL techniques can be effectively used in cybersecurity applications. Future research areas are being elaborated, including the potential research topics to improve several DL methodologies for cybersecurity applications. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Taylor & Francis | en_US |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.title | Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | publishedVersion | en_US |
dc.rights.holder | © 2022 The Author(s). | en_US |
dc.subject.nsi | VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Datateknologi: 551 | en_US |
dc.source.volume | 36 | en_US |
dc.source.journal | Applied Artificial Intelligence | en_US |
dc.source.issue | 1 | en_US |
dc.identifier.doi | 10.1080/08839514.2022.2055399 | |
dc.identifier.cristin | 2015093 | |
dc.source.articlenumber | 2055399 | en_US |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |