Deep Learning Approaches for Cyber Threat Detection and Mitigation
dc.contributor.author | Juyal, A. | |
dc.contributor.author | Bhushan, B. | |
dc.contributor.author | Hameed, A.A. | |
dc.contributor.author | Jamil, A. | |
dc.date.accessioned | 2024-05-19T14:33:46Z | |
dc.date.available | 2024-05-19T14:33:46Z | |
dc.date.issued | 2023 | |
dc.department | İstinye Üniversitesi | en_US |
dc.description | 7th International Conference on Advances in Artificial Intelligence, ICAAI 2023 -- 13 October 2023 through 15 October 2023 -- -- 196685 | en_US |
dc.description.abstract | Cyberspace has inflated over the past decade, primarily driven by pervasive development and widespread usage of the internet. Prolonged cyber-attacks and security vulnerabilities have become more common as a consequence. A recent study conducted by Ponemon Institute revealed that 64% of businesses have suffered web-based attacks in 2023. Thus, cybersecurity measures have become mandatory in every sector, that leverages technology, to protect confidential information from malignant threats. The majority of the sectors use conventional security measures like anti-virus products to defend their systems against outside attacks, however, these products fail to work on unseen and polymorphic threats. With cutting-edge deep learning (DL) processes getting adopted in nearly every field, it has been widely exploited in cybersecurity to detect and classify cyber-attacks. This study discusses the application of common deep learning models in cybersecurity to detect malware, intrusion, phishes, and spam. This study provides a description of deep learning models and their mathematical backgrounds that are common in cybersecurity. This study also reviews and analyses the work of other researchers who experimented with deep learning models in cybersecurity. This study delineates the challenges faced by deep learning models in cybersecurity. Finally, concluding remarks and future research directions are summarized to foresee the potential improvement of deep learning in cybersecurity. © 2023 ACM. | en_US |
dc.identifier.doi | 10.1145/3633598.3633605 | |
dc.identifier.endpage | 41 | en_US |
dc.identifier.isbn | 9798400708985 | |
dc.identifier.scopus | 2-s2.0-85184132216 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 34 | en_US |
dc.identifier.uri | https://doi.org/10.1145/3633598.3633605 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/4331 | |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.ispartof | ACM International Conference Proceeding Series | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.snmz | 20240519_ka | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Deep Learning | en_US |
dc.subject | Intrusion Detection | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Malware Detection | en_US |
dc.title | Deep Learning Approaches for Cyber Threat Detection and Mitigation | en_US |
dc.type | Conference Object | en_US |