Deep Learning in Cybersecurity in the Modern Era
Keywords:
ethical issues, data privacy, artificial intelligence, cybersecurity, threat detection, automation, machine learning, natural language processing, Internet of Things, block chain, quantum computing, and case studies, security postureAbstract
The integration of deep learning into cybersecurity has marked a transformative shift in the way organizations approach threat detection and mitigation. This review article explores the modern era of deep learning in cybersecurity, detailing its significant advantages over traditional security measures, particularly in enhancing threat detection and response mechanisms. Deep learning models, such as Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), have demonstrated remarkable proficiency in identifying anomalies and adapting to evolving cyber threats, enabling real-time responses that mitigate potential damage. Despite its promise, the implementation of deep learning in cybersecurity faces several challenges, including data privacy concerns, model interpretability issues, adversarial vulnerabilities, and the resource-intensive nature of training these models. The emergence of explainable AI (XAI) aims to enhance trust in automated systems by providing interpretable outputs, while federated learning addresses privacy risks by enabling collaborative training without data centralization. Future directions in this field include advancements in adversarial training techniques, the integration of multi-modal data sources, and the deployment of edge computing for real-time threat detection. As organizations continue to embrace deep learning technologies, they will enhance their ability to navigate the complexities of the digital landscape and strengthen their defenses against a continuously evolving array of cyber threats. Overall, deep learning is set to play a crucial role in reshaping cybersecurity practices, driving innovations that improve security postures and operational efficiencies in the face of rising cyber risks.
References
S. Miyake and K. Nakamae, ‘‘A quantum watermarking scheme using simple and small-scale quantum circuits,’’ Quantum Inf. Process., vol. 15, no. 5, pp. 1849–1864, May 2016.
J. Braumüller, J. Cramer, S. Schlör, H. Rotzinger, L. Radtke, A. Lukashenko, P. Yang, S. T. Skacel, S. Probst, M. Marthaler, L. Guo, A. V. Ustinov, and M. Weides, ‘‘Multiphoton dressing of an anharmonic superconducting many-level quantum circuit,’’ Phys. Rev. B, Condens. Matter, vol. 91, no. 5, Feb. 2015, Art. no. 054523.
R. I. Abdelfatah, ‘‘Quantum image encryption using a self-adaptive hash function-controlled chaotic map (SAHF-CCM),’’ IEEE Access, vol. 10, pp. 107152–107169, 2022.
S. Iranmanesh, R. Atta, and M. Ghanbari, ‘‘Implementation of a quantum image watermarking scheme using NEQR on IBM quantum experience,’’ Quantum Inf. Process., vol. 21, no. 6, p. 194, Jun. 2022.
W. Hu, R.-G. Zhou, J. Luo, and B. Liu, ‘‘LSBs-based quantum color images watermarking algorithm in edge region,’’ Quantum Inf. Process., vol. 18, no. 1, p. 16, Jan. 2019
J.-X. Chen, Z.-L. Zhu, C. Fu, H. Yu, and L.-B. Zhang, ‘‘an efficient image encryption scheme using gray code based permutation approach,’’ Opt. Lasers Eng., vol. 67, pp. 191–204, Apr. 2015.
M.-X. Wang, H.-M. Yang, D.-H. Jiang, B. Yan, J.-S. Pan, and T. Wang, ‘‘A novel quantum image watermarking scheme for tamper localization and self-recovery,’’ Quantum Inf. Process., vol. 21, no. 8, p. 277, Aug. 2022
R. Zhang, D. Xiao, and Y. Chang, ‘‘A novel image authentication with tamper localization and self-recovery in encrypted domain based on compressive sensing,’’ Secur. Commun. Netw., vol. 2018, pp. 1–15, Mar. 2018.
J.-W. Jiang, T. Zhang, W. Li, and S.-M. Wang, ‘‘A quantum image watermarking scheme based on quantum Hilbert scrambling and steganography about the Moiré fringe,’’ Quantum Eng., vol. 2023, pp. 1–12, Mar. 2023
G. Hai-Ru, D. Ya-Ying, and X. Quan, ‘‘Quantum image watermarking algorithm based on blocked spatial domain,’’ Chin. J. Quantum Electron. vol. 35, no. 5, p. 527, 2018.
Y. Zhou, R.-G. Zhou, X. Liu, and G. Luo, ‘‘A quantum image watermarking scheme based on two-bit superposition,’’ Int. J. Theor. Phys., vol. 58, no. 3, pp. 950–968, Mar. 2019.
R.-G. Zhou, P. L. Yang, X. A. Liu, and H. Ian, ‘‘Quantum color image watermarking based on fast bit-plane scramble and dual embedded,’’ Int. J. Quantum Inf., vol. 16, no. 7, Oct. 2018, Art. No. 1850060.
X. Jin, S. Yin, N. Liu, X. Li, G. Zhao, and S. Ge, ‘‘Color image encryption in non-RGB color spaces,’’ Multimedia Tools Appl., vol. 77, no. 12, pp. 15851–15873, Jun. 2018.
V. Zea, J. F. Barrera, and R. Torroba, ‘‘Innovative speckle noise reduction procedure in optical encryption,’’ J. Opt., vol. 19, no. 5, May 2017, Art. No. 055704.
Y. Yang, X. Xiao, X. Cai, and W. Zhang, ‘‘A secure and privacypreserving technique based on contrast-enhancement reversible data hiding and plaintext encryption for medical images,’’ IEEE Signal Process. Lett. vol. 27, pp. 256–260, 2020.
D. Ghai, H. K. Gianey, A. Jain, and R. S. Uppal, ‘‘Quantum and dual-tree complex wavelet transform-based image watermarking,’’ Int. J. Modern Phys. B, vol. 34, no. 4, Feb. 2020, Art. No. 2050009.
Shafique, M. M. Hazzazi, A. R. Alharbi, and I. Hussain, ‘‘Integration of spatial and frequency domain encryption for digital images,’’ IEEE Access, vol. 9, pp. 149943–149954, 2021.
Y. Ou, C. Sur, and K. H. Rhee, ‘‘Region-based selective encryption for medical imaging,’’ in Proc. Int. Workshop Frontiers Algorithmics, Lanzhou, China. Cham, Switzerland: Springer, Aug. 2007, pp. 62–73.
X. Chai, H. Wu, Z. Gan, Y. Zhang, Y. Chen, and K. W. Nixon, ‘‘An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding,’’ Opt. Lasers Eng., vol. 124, Jan. 2020, Art. No. 105837.
W.-W. Hu, R.-G. Zhou, A. El-Rafei, and S.-X. Jiang, ‘‘Quantum image watermarking algorithm based on Haar wavelet transform,’’ IEEE Access, vol. 7, pp. 121303–121320, 2019.
P. Fan, M. Hou, W. Hu, and K. Xiao, ‘‘Quantum image encryption based on block geometric and Haar wavelet transform,’’ Int. J. Theor. Phys., vol. 61, no. 11, p. 260, Nov. 2022.
R. Kuang, D. Lou, A. He, C. McKenzie, and M. Redding, ‘‘Pseudo quantum random number generator with quantum permutation pad,’’ in Proc. IEEE Int. Conf. Quantum Comput. Eng. (QCE), Oct. 2021, pp. 359–364
Akhshani, A. Akhavan, A. Mobaraki, S.-C. Lim, and Z. Hassan, ‘‘Pseudo random number generator based on quantum chaotic map,’’ Commun. Nonlinear Sci. Numer. Simul., vol. 19, no. 1, pp. 101–111, Jan. 2014.
P. Ayubi, S. Setayeshi, and A. M. Rahmani, ‘‘Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application,’’ J. Inf. Secur. Appl., vol. 52, Jun. 2020, Art. no. 102472.
M. Ahmad, M. N. Doja, and M. S. Beg, ‘‘A new chaotic map based secure and efficient pseudo-random bit sequence generation,’’ in Proc. Int. Symp. Secur. Comput. Commun. Bengaluru, India. Cham, Switzerland: Springer, Sep. 2018, pp. 543–553
M. Iavich, T. Kuchukhidze, S. Gnatyuk, and A. Fesenko, ‘‘Novel certification method for quantum random number generators,’’ Int. J. Comput. Netw. Inf. Secur., vol. 13, no. 3, pp. 28–38, Jun. 2021.
M. Avesani, D. G. Marangon, G. Vallone, and P. Villoresi, ‘‘Sourcedevice-independent heterodyne-based quantum random number generator at 17 Gbps,’’ Nature Commun., vol. 9, no. 1, p. 5365, Dec. 2018.
B. Sanguinetti, A. Martin, H. Zbinden, and N. Gisin, ‘‘Quantum random number generation on a mobile phone,’’ Phys. Rev. X, vol. 4, no. 3, Sep. 2014, Art. No. 031056.
N. D. Truong, J. Y. Haw, S. M. Assad, P. K. Lam, and O. Kavehei, ‘‘Machine learning cryptanalysis of a quantum random number generator,’’ IEEE Trans. Inf. Forensics Security, vol. 14, no. 2, pp. 403–414, Feb. 2019.
X. Liu, D. Xiao, and C. Liu, ‘‘Three-level quantum image encryption based on Arnold transform and logistic map,’’ Quantum Inf. Process., vol. 20, no. 1, pp. 1–22, Jan. 2021.
R. Vidhya and M. Brindha, ‘‘A novel approach for chaotic image encryption based on block level permutation and bit-wise substitution,’’ Multimedia Tools Appl., vol. 81, no. 3, pp. 3735–3772, Jan. 2022.
Q. Li, X. Wang, X. Wang, B. Ma, C. Wang, Y. Xian, and Y. Shi, ‘‘A novel grayscale image steganography scheme based on chaos encryption and generative adversarial networks,’’ IEEE Access, vol. 8, pp. 168166–168176, 2020.
T. Li, J. Shi, X. Li, J. Wu, and F. Pan, ‘‘Image encryption based on pixellevel diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes,’’ Entropy, vol. 21, no. 3, p. 319, Mar. 2019. [
X. Liu, D. Xiao, and C. Liu, ‘‘Double quantum image encryption based on Arnold transform and qubit random rotation,’’ Entropy, vol. 20, no. 11, p. 867, Nov. 2018.
M. Sharma and A. Bhargava, ‘‘Chaos based image encryption using two step iterated logistic map,’’ in Proc. Int. Conf. Recent Adv. Innov. Eng. (ICRAIE), Dec. 2016, pp. 1–5. 27552 VOLUME 12, 2024 A. Mehmood et al.: Advances and Vulnerabilities in Modern Cryptographic Techniques
T. Janani and M. Brindha, ‘‘A secure medical image transmission scheme aided by quantum representation,’’ J. Inf. Secur. Appl., vol. 59, Jun. 2021, Art. No. 102832
X. Liu, D. Xiao, W. Huang, and C. Liu, ‘‘Quantum block image encryption based on Arnold transform and sine chaotification model,’’ IEEE Access, vol. 7, pp. 57188–57199, 2019
E. Y. Baagyere, P. A. Agbedemnab, Z. Qin, M. I. Daabo, and Z. Qin, ‘‘A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers,’’ IEEE Access, vol. 8, pp. 100438–100447, 2020.
J. Kh-Madhloom, M. K. A. Ghani, and M. R. Baharon, ‘‘ECG encryption enhancement technique with multiple layers of AES and DNA computing,’’ Intell. Autom. Soft Comput., vol. 28, no. 2, pp. 493–512, 2021.
F. Prior, K. Smith, A. Sharma, J. Kirby, L. Tarbox, K. Clark, W. Bennett, T. Nolan, and J. Freymann, ‘‘The public cancer radiology imaging collections of the cancer imaging archive,’’ Sci. Data, vol. 4, no. 1, pp. 1–7, Sep. 2017.
Z. Qu and H. Sun, ‘‘A secure information transmission protocol for healthcare cyber based on quantum image expansion and Grover search algorithm,’’ IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 2551–2563, Sep. 2023.
R.-G. Zhou, Q. Wu, M.-Q. Zhang, and C.-Y. Shen, ‘‘Quantum image encryption and decryption algorithms based on quantum image geometric transformations,’’ Int. J. Theor. Phys., vol. 52, no. 6, pp. 1802–1817, Jun. 2013
Z. Man, J. Li, X. Di, X. Liu, J. Zhou, J. Wang, and X. Zhang, ‘‘A novel image encryption algorithm based on least squares generative adversarial network random number generator,’’ Multimedia Tools Appl., vol. 80, no. 18, pp. 27445–27469, Jul. 2021.
J. Wu, W. Xia, G. Zhu, H. Liu, L. Ma, and J. Xiong, ‘‘Image encryption based on adversarial neural cryptography and SHA controlled chaos,’’ J. Modern Opt., vol. 68, no. 8, pp. 409–418, May 2021.
X. Liao, A. Kulsoom, and S. Ullah, ‘‘A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps,’’ Multimedia Tools Appl., vol. 75, no. 18, pp. 11241–11266, Sep. 2016.
M. Alsafyani, F. Alhomayani, H. Alsuwat, and E. Alsuwat, ‘‘Face image encryption based on feature with optimization using secure crypto general adversarial neural network and optical chaotic map,’’ Sensors, vol. 23, no. 3, p. 1415, Jan. 2023.
X. Hao, W. Ren, R. Xiong, T. Zhu, and K.-K.-R. Choo, ‘‘Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things,’’ Future Gener. Comput. Syst., vol. 124, pp. 243–253, Nov. 2021.
G. Maddodi, A. Awad, D. Awad, M. Awad, and B. Lee, ‘‘A new image encryption algorithm based on heterogeneous chaotic neural network generator and DNA encoding,’’ Multimedia Tools Appl., vol. 77, no. 19, pp. 24701–24725, Oct. 2018.