THE ROLE OF DEEP LEARNING IN CYBER DECEPTION TECHNIQUES FOR NETWORK DEFENSE

Authors

  • Nivedhaa N Narayana E-Techno School, Sholinganallur, Chennai, Tamil Nadu, India. Author

Keywords:

Cybersecurity, Network Defense, Deep Learning, Cyber Deception, Artificial Intelligence, Threat Detection, Anomaly Detection, Adversarial Attacks, Data Privacy, Network Security

Abstract

In the ever-evolving landscape of cybersecurity, the efficacy of traditional defense mechanisms against sophisticated threats is increasingly questioned. Cyber deception, a strategy rooted in deliberately misleading adversaries, has gained prominence as a proactive defense approach. Concurrently, deep learning, a subset of artificial intelligence, has emerged as a potent tool for analyzing vast data sets and detecting intricate patterns. This paper explores the fusion of deep learning and cyber deception techniques for network defense. Drawing from historical contexts and contemporary cybersecurity challenges, we investigate how deep learning enhances deception strategies, thereby augmenting network defense capabilities. Through an analysis of case studies, we illustrate the practical application of deep learning in cyber deception scenarios. Additionally, we address challenges such as data scarcity, interpretability issues, and adversarial attacks, while proposing future research avenues. This study provides insights into the synergy between deep learning and cyber deception, offering valuable perspectives for advancing network defense strategies in the digital age.

   

References

F. O. Olowononi, A. H. Anwar, D. B. Rawat, J. C. Acosta and C. A. Kamhoua, "Deep Learning for Cyber Deception in Wireless Networks," 2021 17th International Conference on Mobility, Sensing and Networking (MSN), Exeter, United Kingdom, 2021, pp. 551-558, doi: 10.1109/MSN53354.2021.00086.

Edwin K. Serem, David M. Mugo, and Boaz K. Too, Deceptive Decoys: Combining Believable User and Network Activities and Deceptive Network Setup in Enhancing Effectiveness, International Journal of Electrical Engineering and Technology (IJEET), 12(6), 2021, pp. 281-292 doi: 10.34218/IJEET.12.6.2021.027

Abdulrahman A. Almaliki and Solmaz Safari, Employees Awareness Assessment of Cyber Security in Saudi Universities, International Journal of Computer Engineering and Technology (IJCET), 14(2), 2023, 180-193

Abdulrahman A. Almaliki, Solmaz Safari, Employees Awareness of Cyber Security in Saudi Universities: A Paper Review, International Journal of Advanced Research in Engineering and Technology (IJARET), 14(5), 2023, pp. 26-36 doi: https://doi.org/10.17605/OSF.IO/ZP3FV

Gattani Tanuj Subhash, Dr. S Anupama Kumar, 2023, Artificial Intelligence Approaches to Uncover Cyber Security, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 12, Issue 08 (August 2023)

Sharmin, N. (2023). Bayesian Models for Targeted Cyber Deception Strategies. In Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23).

Ramachandran, K. K. "Digital Dynamics: Integrating Online Channels for Sales Promotion Success." International Journal of Advanced Research in Management (IJARM), 14(2), 2023, pp. 20-35.

Nagaraj, K. (2023). Deception Technology: Enhancing Cybersecurity with the Power of Deception. Retrieved from https://cyberw1ng.medium.com/deception-technology-enhancing-cybersecurity-with-the-power-of-deception-karthikeyan-nagaraj-4de2728ccf99

Mohan, Pilla Vaishno, et al. "Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions." Sensors 22.6 (2022): 2194.

R.Sharmila and N.Kannan, A Comprehensive Survey of Cyber Security Specific to Cyber Defence and Digital Forensics, International Journal of Computer Engineering and Technology (IJCET), 14(2), 2023, pp. 61-72 doi: https://doi.org/10.17605/OSF.IO/H9DBX

N.Kannan, A review of Deep Generative Models for Synthetic Financial Data Generation. International Journal of Financial Data Science (IJFDS), 2(1), 2024, 1-10.

Dr. K K Ramachandran, The Use of Data Mining in Education: An Overview of State of The Art, Limitations, and Emerging Research Areas, International Journal of Data Analytics Research and Development (IJDARD), 1(1), 2023, pp. 1–8 doi: https://doi.org/10.17605/OSF.IO/YQS9X

Nivedhaa N, " From Raw Data to Actionable Insights: A Holistic Survey of Data Science Processes," International Journal of Data Science (IJDS), vol. 1, issue 1, pp. 1-16, 2024.

Ananth Raja Muthukalyani, Leveraging Data Science Techniques for Customer Segmentation and Targeted Marketing in the Retail Industry, International Journal of Data Analytics Research and Development (IJDARD), 1(1), 2023, pp. 42-50.

Nivedhaa N, A Comprehensive Analysis of Current Trends in Data Security, International Journal of Cyber Security (IJCS), 2(1), 2024, 1-16.

Downloads

Published

2024-02-13

How to Cite

THE ROLE OF DEEP LEARNING IN CYBER DECEPTION TECHNIQUES FOR NETWORK DEFENSE. (2024). GLOBAL JOURNAL OF CYBER SECURITY (GJCS), 2(1), 1-10. https://mylib.in/index.php/GJCS/article/view/GJCS_02_01_001