Skip to main content

Deep Learning Applications on Cybersecurity

  • Conference paper
  • First Online:
Hybrid Artificial Intelligent Systems (HAIS 2021)

Abstract

Security has always been one of the biggest challenges faced by computer systems, recent developments in the field of Machine Learning are affecting almost all aspects of computer science and Cybersecurity is no different. In this paper, we have focused on studying the possible application of deep learning techniques to three different problems faced by Cybersecurity: SPAM filtering, malware detection and adult content detection in order to showcase the benefits of applying them. We have tested a wide variety of techniques, we have applied LSTMs for spam filtering, then, we have used DNNs for malware detection and finally, CNNs in combination with Transfer Learning for adult content detection, as well as applying image augmentation techniques to improve our dataset. We have managed to reach an AUC over 0.9 on all cases, demonstrating that it is possible to build cost-effective solutions with excellent performance without complex architectures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://drive.google.com/file/d/1HIJShr0GvQCUp_0R_kQe_WLG5PippurN/view.

  2. 2.

    https://www.kaggle.com/ozlerhakan/spam-or-not-spam-dataset.

  3. 3.

    https://www.kaggle.com/uciml/sms-spam-collection-dataset.

  4. 4.

    https://github.com/rafaelromon/SecurityML.

References

  1. Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter (2018)

    Google Scholar 

  2. Ervural, B.C., Ervural, B.: Overview of cyber security in the industry 4.0 era. In: Industry 4.0: Managing The Digital Transformation. SSAM, pp. 267–284. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-57870-5_16

    Chapter  Google Scholar 

  3. Ferrara, E.: The history of digital spam. Commun. ACM 62(8), 82–91 (2019). https://doi.org/10.1145/3299768

    Article  Google Scholar 

  4. Firdausi, I., Erwin, A., Nugroho, A.S., et al.: Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 201–203. IEEE (2010)

    Google Scholar 

  5. Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5–6), 602–610 (2005)

    Article  Google Scholar 

  6. Gupta, M., Bakliwal, A., Agarwal, S., Mehndiratta, P.: A comparative study of spam SMS detection using machine learning classifiers. In: 2018 Eleventh International Conference on Contemporary Computing (IC3), pp. 1–7. IEEE (2018)

    Google Scholar 

  7. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  8. Huang, G., Liu, Z., van der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks (2016)

    Google Scholar 

  9. Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)

    Google Scholar 

  10. Lee, S.M., Kim, D.S., Kim, J.H., Park, J.S.: Spam detection using feature selection and parameters optimization. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 883–888. IEEE (2010)

    Google Scholar 

  11. Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017). https://doi.org/10.1016/j.neucom.2016.12.038

    Article  Google Scholar 

  12. Mikołajczyk, A., Grochowski, M.: Data augmentation for improving deep learning in image classification problem. In: 2018 International Interdisciplinary PhD Workshop (IIPhDW), pp. 117–122. IEEE (2018)

    Google Scholar 

  13. Nogales, I.O., de Vicente Remesal, J., Castañón, J.M.P.: Código penal y legislación complementaria. Editorial Reus (2018)

    Google Scholar 

  14. Perez, L., Wang, J.: The effectiveness of data augmentation in image classification using deep learning. arXiv preprint arXiv:1712.04621 (2017)

  15. Ronao, C.A., Cho, S.-B.: Deep convolutional neural networks for human activity recognition with smartphone sensors. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9492, pp. 46–53. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26561-2_6

    Chapter  Google Scholar 

  16. Rowley, H.A., Jing, Y., Baluja, S.: Large scale image-based adult-content filtering (2006)

    Google Scholar 

  17. Seide, F., Li, G., Chen, X., Yu, D.: Feature engineering in context-dependent deep neural networks for conversational speech transcription. In: 2011 IEEE Workshop on Automatic Speech Recognition & Understanding (2011). https://doi.org/10.1109/asru.2011.6163899

  18. Van De Sande, K., Gevers, T., Snoek, C.: Evaluating color descriptors for object and scene recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(9), 1582–1596 (2009)

    Article  Google Scholar 

  19. Vu, D.L., Nguyen, T.K., Nguyen, T.V., Nguyen, T.N., Massacci, F., Phung, P.H.: A convolutional transformation network for malware classification (2019)

    Google Scholar 

  20. Wang, Y., Huang, M., Zhu, X., Zhao, L.: Attention-based LSTM for aspect-level sentiment classification. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, pp. 606–615 (2016)

    Google Scholar 

  21. Wehrmann, J., Simões, G.S., Barros, R.C., Cavalcante, V.F.: Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272, 432–438 (2018)

    Article  Google Scholar 

  22. Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (CSUR) 50(3), 1–40 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iker Pastor López .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lago, C., Romón, R., López, I.P., Urquijo, B.S., Tellaeche, A., Bringas, P.G. (2021). Deep Learning Applications on Cybersecurity. In: Sanjurjo González, H., Pastor López, I., García Bringas, P., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2021. Lecture Notes in Computer Science(), vol 12886. Springer, Cham. https://doi.org/10.1007/978-3-030-86271-8_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86271-8_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86270-1

  • Online ISBN: 978-3-030-86271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics