A short review on Applications of Deep learning for Cyber security

12/15/2018
by   Mohammed Harun Babu R, et al.
0

Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works related to deep learning based solutions for various cyber security use cases. Keywords: Deep learning, intrusion detection, malware detection, Android malware detection, spam & phishing detection, traffic analysis, binary analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/19/2019

New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning

With the development of artificial intelligence algorithms like deep lea...
research
10/04/2022

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

n this paper, we present a survey of deep learning approaches for cyber ...
research
04/24/2018

Automated Big Traffic Analytics for Cyber Security

Network traffic analytics technology is a cornerstone for cyber security...
research
08/08/2023

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Malicious software is an integral part of cybercrime defense. Due to the...
research
10/16/2020

DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture

The Intent in Android plays an important role in inter-process and intra...
research
01/31/2019

A Holistic Approach to Evaluating Cyber Security Defensive Capabilities

Metrics and frameworks to quantifiably assess security measures have ari...
research
12/09/2018

Deep-Net: Deep Neural Network for Cyber Security Use Cases

Deep neural networks (DNNs) have witnessed as a powerful approach in thi...

Please sign up or login with your details

Forgot password? Click here to reset