Abstract
Security has always been one of the biggest challenges faced by computer systems, recent developments in the field of Machine Learning are affecting almost all aspects of computer science and Cybersecurity is no different. In this paper, we have focused on studying the possible application of deep learning techniques to three different problems faced by Cybersecurity: SPAM filtering, malware detection and adult content detection in order to showcase the benefits of applying them. We have tested a wide variety of techniques, we have applied LSTMs for spam filtering, then, we have used DNNs for malware detection and finally, CNNs in combination with Transfer Learning for adult content detection, as well as applying image augmentation techniques to improve our dataset. We have managed to reach an AUC over 0.9 on all cases, demonstrating that it is possible to build cost-effective solutions with excellent performance without complex architectures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter (2018)
Ervural, B.C., Ervural, B.: Overview of cyber security in the industry 4.0 era. In: Industry 4.0: Managing The Digital Transformation. SSAM, pp. 267–284. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-57870-5_16
Ferrara, E.: The history of digital spam. Commun. ACM 62(8), 82–91 (2019). https://doi.org/10.1145/3299768
Firdausi, I., Erwin, A., Nugroho, A.S., et al.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 201–203. IEEE (2010)
Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5–6), 602–610 (2005)
Gupta, M., Bakliwal, A., Agarwal, S., Mehndiratta, P.: A comparative study of spam SMS detection using machine learning classifiers. In: 2018 Eleventh International Conference on Contemporary Computing (IC3), pp. 1–7. IEEE (2018)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Huang, G., Liu, Z., van der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks (2016)
Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)
Lee, S.M., Kim, D.S., Kim, J.H., Park, J.S.: Spam detection using feature selection and parameters optimization. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 883–888. IEEE (2010)
Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017). https://doi.org/10.1016/j.neucom.2016.12.038
Mikołajczyk, A., Grochowski, M.: Data augmentation for improving deep learning in image classification problem. In: 2018 International Interdisciplinary PhD Workshop (IIPhDW), pp. 117–122. IEEE (2018)
Nogales, I.O., de Vicente Remesal, J., Castañón, J.M.P.: Código penal y legislación complementaria. Editorial Reus (2018)
Perez, L., Wang, J.: The effectiveness of data augmentation in image classification using deep learning. arXiv preprint arXiv:1712.04621 (2017)
Ronao, C.A., Cho, S.-B.: Deep convolutional neural networks for human activity recognition with smartphone sensors. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9492, pp. 46–53. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26561-2_6
Rowley, H.A., Jing, Y., Baluja, S.: Large scale image-based adult-content filtering (2006)
Seide, F., Li, G., Chen, X., Yu, D.: Feature engineering in context-dependent deep neural networks for conversational speech transcription. In: 2011 IEEE Workshop on Automatic Speech Recognition & Understanding (2011). https://doi.org/10.1109/asru.2011.6163899
Van De Sande, K., Gevers, T., Snoek, C.: Evaluating color descriptors for object and scene recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(9), 1582–1596 (2009)
Vu, D.L., Nguyen, T.K., Nguyen, T.V., Nguyen, T.N., Massacci, F., Phung, P.H.: A convolutional transformation network for malware classification (2019)
Wang, Y., Huang, M., Zhu, X., Zhao, L.: Attention-based LSTM for aspect-level sentiment classification. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, pp. 606–615 (2016)
Wehrmann, J., Simões, G.S., Barros, R.C., Cavalcante, V.F.: Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272, 432–438 (2018)
Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 1–40 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Lago, C., Romón, R., López, I.P., Urquijo, B.S., Tellaeche, A., Bringas, P.G. (2021). Deep Learning Applications on Cybersecurity. In: Sanjurjo González, H., Pastor López, I., García Bringas, P., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2021. Lecture Notes in Computer Science(), vol 12886. Springer, Cham. https://doi.org/10.1007/978-3-030-86271-8_51
Download citation
DOI: https://doi.org/10.1007/978-3-030-86271-8_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86270-1
Online ISBN: 978-3-030-86271-8
eBook Packages: Computer ScienceComputer Science (R0)