Applications of Deep Learning in Cyber Threat Detection

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 April 2025 | Viewed by 440

Special Issue Editors


E-Mail Website
Guest Editor
Computer and Information Technology Department, Purdue University in Indianapolis, Indianapolis, IN 46222, USA
Interests: explainable AI for network intrusion detection
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Management Science & Information Systems, Oklahoma State University, Stillwater, OK 74078, USA
Interests: natural language processing; AI; information retrieval; health informatics; security

Special Issue Information

Dear Colleagues,

The exponential growth of network intrusions and cyberattacks poses a significant threat to critical infrastructure across various sectors (including power, autonomous driving, IoT systems, and among others). This growth necessitates the development of advanced artificial intelligence techniques for cyber threat detection where securing current systems and networks against such threats will safeguard computer network systems against malicious activities, initiated by internal users or external infiltrators.

With recent advancements in deep learning over the past decade, this design paradigm has paved the way for the development of AI models that are capable of automatically detecting cyber intrusions. The current trend is developing AI-based systems that have both strong classification accuracy (leveraging various AI algorithms) while providing insights about their behavior and reasoning.

To achieve such a goal, interdisciplinary areas of research are needed (including using single deep learning methods and ensemble techniques for enhancing the accuracy of cyber threat detection, leveraging explainable AI for understanding the decision-making of these deep learning cyber threat detection models, and testing the efficiency and robustness of the developed deep learning-based threat detection methods).

The Special Issue focuses on the discussion of emerging solutions suitable for accomplishing efficient and reliable security technologies that leverage deep learning approaches. Potential topics of interest include, but are not limited to, the following:

  • Deep learning methods for advanced network intrusion detection;
  • Deep learning-based ensemble learning methods for cyber threat detection;
  • Explainable AI for explaining black-box deep learning methods in network intrusion detection;
  • Efficiency analysis and optimization of deep learning methods for cyber threat detection;
  • Deep learning methods for detecting threats to Internet-of-things (IoT) networks;
  • Feature selection for enhancing performance of deep learning methods for cyberthreat detection;
  • Evaluation frameworks for current deep learning methods for cyber threat detection;
  • Reliability of deep learning-based cyber threat detection methods;
  • Adversarial attacks on deep neural networks for cyber threat detection.

We look forward to receiving your contributions. 

Dr. Mustafa Abdallah
Dr. Xiao Luo
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • deep learning
  • network security
  • intrusion detection
  • explainable AI
  • IoT
  • deep neural networks
  • ensemble learning
  • feature selection
  • adversarial attacks on DNNs
  • cyber security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 4942 KiB  
Article
Unsupervised Anomaly Detection and Explanation in Network Traffic with Transformers
by André Kummerow, Esrom Abrha, Markus Eisenbach and Dennis Rösch
Electronics 2024, 13(22), 4570; https://doi.org/10.3390/electronics13224570 - 20 Nov 2024
Viewed by 307
Abstract
Deep learning-based autoencoders represent a promising technology for use in network-based attack detection systems. They offer significant benefits in managing unknown network traces or novel attack signatures. Specifically, in the context of critical infrastructures, such as power supply systems, AI-based intrusion detection systems [...] Read more.
Deep learning-based autoencoders represent a promising technology for use in network-based attack detection systems. They offer significant benefits in managing unknown network traces or novel attack signatures. Specifically, in the context of critical infrastructures, such as power supply systems, AI-based intrusion detection systems must meet stringent requirements concerning model accuracy and trustworthiness. For the intrusion response, the activation of suitable countermeasures can greatly benefit from additional transparency information (e.g., attack causes). Transformers represent the state of the art for learning from sequential data and provide important model insights through the widespread use of attention mechanisms. This paper introduces a two-stage transformer-based autoencoder for learning meaningful information from network traffic at the packet and sequence level. Based on this, we present a sequential attention weight perturbation method to explain benign and malicious network packets. We evaluate our method against benchmark models and expert-based explanations using the CIC-IDS-2017 benchmark dataset. The results show promising results in terms of detecting and explaining FTP and SSH brute-force attacks, highly outperforming the results of the benchmark model. Full article
(This article belongs to the Special Issue Applications of Deep Learning in Cyber Threat Detection)
Show Figures

Figure 1

Back to TopTop