Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
137 views

A Review On Application of Deep Learning in Cyber Forensics

In recent times, most of the data such as books, personal materials and genetic information digitally. This transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this lead to the development of securing the cyberspace and protecting against cybercrime. As more people started using cyberspace, more number of cybercrime were registered. As the number of crime increases, we are in need of help from Machine Learning.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views

A Review On Application of Deep Learning in Cyber Forensics

In recent times, most of the data such as books, personal materials and genetic information digitally. This transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this lead to the development of securing the cyberspace and protecting against cybercrime. As more people started using cyberspace, more number of cybercrime were registered. As the number of crime increases, we are in need of help from Machine Learning.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

8 VII July 2020

http://doi.org/10.22214/ijraset.2020.7011
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 8 Issue VII July 2020- Available at www.ijraset.com

A Review on Application of Deep Learning in


Cyber Forensics
Sri Vishva. E1
Student, School of Computer Science and Engineering (SCOPE), VIT UNIVERSITY, Vellore, India1

Abstract: In recent times, most of the data such as books, personal materials and genetic information digitally. This
transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this lead
to the development of securing the cyberspace and protecting against cybercrime. As more people started using cyberspace, more
number of cybercrime were registered. As the number of crime increases, we are in need of help from Machine Learning.
Machine Learning in the field of Cyber forensics, is a boon. In this paper we have an overview of Machine Learning in the field
of Cyber Forensics and various method of it implementation.

I. INTRODUCTION
1) Deep Learning and Machine Learning: The field of Artificial Intelligence and Machine Learning has been around since a long
time but it is now that we have enough computational power to effectively develop strong artificial neural networks (ANN) in a
reasonable time frame with the help of strong hardware and software support. The most important aspect of Cyber security
involves protecting key data and devices from cyber threats. It’s an important part of corporations that collect and maintain
large databases of client data, social platforms wherever personal information were submitted and also the government
organizations wherever secret, political and defence information comes into measure. Unlike the traditional machine learning
algorithm that uses feature engineering and illustration ways. They will chose the best options by themselves.
2) Cyber Security: Cyber security is that the set of framework and processes designed to protect computers, networks, programs,
and data from attack, unauthorized access, change, or destruction. These frameworks are consist of network security and host
security systems, every of those has a minimum firewall, antivirus computer code, associated an intrusion detection system.
3) Deep Learning and Cyber Security: This survey summarizes the association of cyber security and Deep learning techniques
(DL). Deep learning technique are being used by researchers in recent days. Deep learning can be used alongside the prevailing
automation ways like rule and heuristics based and machine learning techniques. This survey helps is understand the benefits of
deep learning algorithms to classify and tackle malicious activities that perceived from the varied sources like DNS, email,
URLs etc. In recent days, non-public firms and public establishments are dealing with constant and complicated cyber threats
and cyberattacks. As a precaution, organizations should build and develop a cybersecurity culture and awareness so as to defend
against cyber criminals.
4) Shared Task: In this shared task conference, the train data set will be distributed among the participants and the train model
will be evaluated based on the test data set. This is most common in NLP area recently shared task on identifying phishing
email has been organized by. The details of the submitted runs are available throughout. Followed by shared task on detecting
malicious domain organized intruders. These two shared tasks enables the participants to share their approach through working
notes or system description paper. Each year there is one more shared task conducted by CDMC. But they don’t provide us an
option to submit system description papers. But recently they are giving an option to submit system description papers (CDMC
2018). One significant issue was that the available data sets are very old and each data set has their own limitations. The main
issue we face now is due to the non-maintenance of Cybercrime data. To overcome such issues a brief investigative issue made
to understand the need of Security domain, datasets and key feature of data sciences is discussed in for problems employing the
data science towards cyber security. The need for such dataset in to be promoted.

II. LITERATURE SURVEY


1) Intrusion Detection: The traditional machine learning approach (shallow models) for Intrusion Detection System primarily
include the artificial neural network (ANN), support vector machine (SVM), K-nearest neighbour (KNN), naïve Bayes, logistic
regression , decision tree, clustering, combined and hybrid methods. Some of these methods have been studied for several
years, and their methodology is mature. Their focus not only limited to the detection effect but also on practical problems, e.g.,
detection efficiency and data management. Deep learning models contains of diverse deep neural networks. Among them, deep

©IJRASET: All Rights are Reserved 61


International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 8 Issue VII July 2020- Available at www.ijraset.com

brief networks , deep neural networks , convolutional neural networks , and recurrent neural networks are supervised learning
models, while autoencoders, restricted Boltzmann machines , and generative adversarial networks are unsupervised models.
The various number of studies of deep learning-based IDSs has increased rapidly from 2015 to the present. Deep learning
models directly interact with feature representations from the original data, such as images and texts, without requiring manual
feature engineering. Hence, deep learning methods can be execute in an end-to-end manner. For huge datasets, deep learning
methods have a huge advantage over shallow models. In the field of deep learning, the main emphases are network architecture,
hyperparameter selection, and optimization strategy.
2) Traffic Analysis: By training an algorithm against history of production traffic data, the mathematical model gets a boost start in
creating a data classification. Subsequently data can be classified with existing class, and new clusters can be derived that are
more efficiently group the data. As models for differentiating traffic emerge, they can be tested against new data and compared
against existing dataset for security rulesets for accuracy. Improvements that can be derived from the current model can be
integrated into the framework, and the process can be repeated continuously.
3) Malware Analysis: Malware refers to malicious software attackers dispatch to infect individual computers or an entire
organization’s network. It exploits target user system vulnerabilities, such as a bug in legitimate software (e.g., a browser or
web application plugin) that can be hijacked. A classical fully connected neural network and recurrent neural network (RNN)
model of deep learning was traditionally employed to detect malware with 300 bytes information from the Portable Executables
header file . Subsequently, we have employed convolutional neural network (CNN) on a large number of byte long
executables and obtained consistent results across 2 different tests based on a previous study. Using domain level
knowledge, we have extracted several features and showed that its performance is comparable to the MalConv deep learning
approach. The performance metrics of MalConv model was improved by making modification to the existing architecture. I
believe that the deep learning potential have not been fully realized, and the work proposes the application of Windows-Static
Brain-Droid (WSBD) model for incorporating deep learning.

III. CONCLUSION
This Survey help us to conclude the need of automated algorithm against Cyberattacks. In comparison between Machine Learning
Algorithms and Deep Learning Algorithm, Deep Learning Algorithm turns out to be the optimal for Cyber Security. The main set
back we encounter is the unavailability of updated dataset. This review also urges to maintain a Cyberattack Dataset, for further
usage.

IV. ACKNOWLEDGMENT
I would like to take this opportunity for thanking my Guide Dr Aju.D, who has cultivated the knowledge on Cyberspace in me. I
would also thank my Institution VIT-VELLORE , parents and friends for their continuous support.

REFERENCES
[1] Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak, Malware Detection using Machine Learning and Deep Learning
[2] R. Devakunchari, Sourabh, Prakhar Malik, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075,Volume-8,
Issue-7C2, May 2019, A Study of Cyber Security using Machine Learning Techniques
[3] R. Vinayakumar , Mamoun Alazab , K. P. Soman, Prabaharan Poornachandran, Sitalakshmi Venkatraman, Robust Intelligent Malware Detection Using Deep
Learning
[4] Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. (2014). Dropout: a simple way to prevent neural networks from overfitting.
Journal of machine learning research, 15(1), 1929-1958.
[5] Ioffe, S., & Szegedy, C. (2015, June). Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference
on Machine Learning (pp. 448-456).
[6] Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Detecting malicious domain names using deep learning approaches at scale. Journal of
Intelligent & Fuzzy Systems, 34(3), 1355-1367.
[7] Vinayakumar, R., Poornachandran, P., & Soman, K. P. (2018). Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems
Data Analysis. In Big Data in Engineering Applications (pp. 113-142). Springer, Singapore.
[8] Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: a survey. Computers, 3(1), 1-35.
[9] Karbab, E. B., Debbabi, M., Derhab, A., & Mouheb, D. (2017). Android Malware Detection using Deep Learning on API Method Sequences. arXiv preprint
arXiv:1712.08996.
[10] Kapratwar, A. (2016). Static and Dynamic Analysis for Android Malware Detection.

©IJRASET: All Rights are Reserved 62

You might also like