Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:- Recent years have seen the successful Machine Learning- In the middle of the 1950s,
application of deep learning techniques, an enhanced machine learning was developed to generate artificial
model of conventional machine learning, in a variety of intelligence. Its emphasis shifted to developing programmes
fields, including banking, entertainment, coordinating, that were better than iteration but were created with a single
health care, and cyber security. The study concentrated objective in mind and could be broadly understood as a form
on a thorough examination of deep learning techniques in of function optimization. As the 20th century drew to an end,
cyber security. Adversarial attacks have emerged as a artificial intelligence ultimately started to evolve into its own
more significant security threat to many deep learning area, and machine learning started to develop into a more
applications than machine learning in the real world as advanced and mature science. Since numerous disciplines,
deep learning techniques have become the core including computer science and statistics, contribute to and
components for many security-critical applications such are inspired by machine learning, many statistics
as identity recognition cameras, malware detection programmes frequently incorporate and encourage their
software, intrusion detection, spam detection, and self- students to become proficient in the techniques. AI and
driving cars. Through a review of the literature and statistics are coupled with machine learning. [3, 5] Given that
consideration of the important research topics, this paper it combines AI heuristics with statistical analysis, it is an
gives a thorough study on the Deep Learning process, evolution of AI. Machine learning is to make it possible for
supervised, and unsupervised approaches. The survey computer systems to understand the data and make judgments
also discusses important DL architectures used in cyber based on its properties. As a result, it employs statistics for
security applications. fundamental ideas and promotes more AI heuristics to
achieve its goal. Supervised and unsupervised learning are
Keywords:- Deep learning, Cyber Security, Supervised the two main paradigms that make up machine learning. With
learning, and Unsupervised learning. contrast to unsupervised learning, in supervised learning we
already know what the label/response variable Y is. As a
I. INTRODUCTION result, we can efficiently assess a model's effectiveness. We
lack this knowledge in unsupervised learning, making it
For millennia, wise people had fantasised of creating a impossible for us to gauge how accurate we are. It makes
machine that could mimic human brain function. Since sense to talk about the history of this topic before examining
"associationism," a theory that required scientists to the difficulties with both paradigms [3, 4].
comprehend the workings of human recognition systems, was
first put forward by Aristotle in 300 B.C., it is possible to A. Deep Leaning
trace the roots of deep learning all the way back to that time. A subset of machine learning called "deep learning"
The McCulloch-Pitts (MCP) model, also referred to as the allows for highly computational models with numerous
Prototype of artificial neural networks, was first proposed in layers of abstraction. The state of the art in many fields,
1943, marking the beginning of the modern era of deep including the identification of illness treatments and
learning. Based on neural networks that functionally genomes, voice recognition, visual recognition, object
resemble the neocortex in human brains, they developed a finding, and many others, has been greatly enhanced by these
computer model. They used "threshold logic," a techniques. The primary characteristic of dl layers is that they
mathematical and algorithmic mix, in their model to simulate were learned from the data using a general-purpose learning
human reasoning, but not learning. Since then, deep learning technique rather than being created by humans. Deep learning
has continuously advanced, reaching a few major turning is making remarkable strides toward resolving issues that
points [1]. have long defied the best efforts of the AI community. In
addition to multiplying the registers in picture recognition, it
Artificial Intelligence - Artificial intelligence is the has shown to be particularly effective in detecting complex
study of creating computer systems that can simulate human structures in high dimensional data and is thus useful to many
intelligence. The terms "artificial" and "intelligence" make up fields of research, commerce, and government. [5].
this phrase.
Supervised learning: In order to train algorithms to Semi-supervised learning - This strategy falls
correctly recognize input or predict outcomes, it has labeled somewhere in the middle between supervised and
datasets. Supervised education the dataset is separated into unsupervised learning. Combining labeled and unlabeled
pieces for training, testing, and validation. The training data makes up training data. While there is a significant
dataset contains inputs as well as the desired outcomes. After amount of unlabeled data, there is a relatively little amount of
receiving the input data, the model adjusts its weights until annotated data. There needs to be a relationship between the
the error is properly reduced. Algorithms: Multilayer objects with assumptions in order to use the unlabeled
Perception, CNN, RNN, LSTM and GRU dataset.
B. Cyber Security significant issue of cyber security for upcoming ICT systems,
We are entering Industry 4.0 as a result of the rapid it is crucial to identify the gaps in the body of literature. [14]
development of cyber physical systems (CPS), which are With the aim of maintaining the confidentiality, integrity, and
driven by technologies like cloud computing, mobile accessibility of information in the cyberspace, the term
computing, edge computing, and the Internet of Things (IoT). "cyber security" has developed to refer to a collection of
However, as systems become more heterogeneous, principles and practices to safeguard ICT systems and
sophisticated, and networked, the importance of cyber networks. Cybercrime refers to illegal activities committed
security in CPS is also expanding due to the inherent security within the CPS that result in malicious attacks on computer
risks and vulnerabilities. In 2018, there were 13% more hardware, networks, and software. What's more, the dangers
vulnerabilities overall [10]. Zero-day exploits are expected to to data integrity from un authorized access, theft, disclosure,
increase from one per week in 2015 to one per day by 2021 and malicious or unintentional harm are becoming more
[12]. While the demand for cyber security specialists is rising significant. The broad threat categories have not changed
globally to address this issue, there is a scarcity of qualified over time, despite a rise in criminals and enemies in the field
researchers and practitioners, with that number potentially of cyber security. [15] The fundamental purpose of security
reaching 25% [13]. A survey that acts as a lesson for cyber research is to stop attackers from attaining their objectives,
security experts is required. To assist in solving the so it is crucial to have a thorough understanding of the many
This covers insider threat identification, spam and architecture designs for cyber security have proliferated
phishing detection, malware and botnet detection, network recently. On the other hand, attackers are employing the same
traffic analysis, and intrusion detection, among other things. resources to carry out more complex attacks. Today's DL has
With the advancement of technology, cyber security data is made major advancements in traditional signature- and rule-
continuously expanding, and this growth has an impact on based systems as well as traditional machine learning-based
how well DL-based solutions work. Different DL solutions, and it can offer fresh perspectives on issues relating
II. RELATED RESEARCH WORKS The degree of security and privacy offered by any
online network varies depending on the sort of service it
The most recent studies are geared toward readers who offers. The author, Shuochao Yao and Yiran Zhao et al.,
want to start researching deep learning (DL) for cyber discussed difficulties and recently developed solutions that
security. DL is a subset of machine learning; however it point to the viability of creating dependable, efficient, and
differs from traditional learning in that it is more recent and effective IoT systems that incorporate deep learning
complicated. As a result, emphasis is placed heavily on techniques [15].
providing a comprehensive overview of the DL approaches
and providing references to important works for each DL CNNs and RNNs were utilised by Kolosnjaji et al. [16]
method. Examples that show how the techniques have been to recognise malware. One-hot encoding is used to transform
applied in cyber security are also provided. Highly cited the list of call sequences to the API kernel into binary vectors.
papers were given extra attention because they describe A method for storing categorical data that makes it easier for
common procedures. Some less-cited publications were also machine learning is one-hot encoding. The DL algorithm,
picked because it was understood that this emphasis could which consists of a CNN and RNN, is trained using this data
ignore important new and emerging strategies. Overall, (consisting of an LSTM, and a softmax layer). This model
articles were chosen so that each of the DL categories given achieves 89.4% accuracy, 85.6% precision, and 89.4% recall.
below had at least one, but ideally several, representative
papers. This section goes into great detail about the approach LEMNA, a novel technique to develop high-fidelity
and limits of each paper. explanations for specific classification findings for security
applications, is introduced in this paper[17]. A target deep
Jianwensunetal[10]: This study suggests a Deep Belief learning model is treated as a "black box" by LEMNA, and
Network-based approach for automatic fault identification its decision boundary is approximated using a mixed
for quality in section of electro motors. Results produced by regression model improved by fused lasso. We demonstrate
the suggested strategy are quite precise. that the suggested strategy generates extremely accurate
explanations by testing it on two well-known deep learning-
Wei-longzhengetal [12]: In this study, two emotional based security applications. Additionally, we show how
categories based on EEG were classified using Deep Belief LEMNA may help security analysts and machine learning
Networks. When compared to alternative State-of-the-art developers better understand classifier behavior, fix
procedures, the suggested method produces findings that are misclassification issues, and even apply automated updates to
more precise. improve the initial deep learning model.
This work focus on specific environments or applications, Cloud, IoT, Cyber-Physical Systems (CPS), social networks,
biometric and cryptography.