Javascript must be enabled to continue!
DCITD: A Deep Q-Network Approach for Cyber Image Threats Detection
View through CrossRef
Cybersecurity threats Continuously develop and adapt. Posing serious risks for companies, governments, and individuals worldwide. Traditional methods for detecting these threats, which often rely on fixed rules and established patterns, are ineffective against attackers' dynamic and sophisticated tactics. Detecting cyber threats, especially for malware images, presents a considerable challenge for organizations and individuals. Conventional detection techniques, which often depend on fixed rules, are increasingly ineffective against the sophisticated strategies utilized by today’s attackers. That calls for creating more sophisticated and intelligent cyber defense systems, integrating autonomous agents that can learn and make decisions without relying on human knowledge. This paper employed Reinforcement Learning techniques, which is one of the machine learning fields based on trial and error for learning, to propose the Detection of Cyber Image Threats by the DQN (DCITD) model for malware detection system leveraging Deep Q-Networks (DQN) integrated with image-based reinforcement learning. The model uses a Convolutional Neural Network (CNN) to feature extraction and incorporates multithreading to optimize experience replay during training. The DCITD model, utilizing Deep Q-Network (DQN) architecture, showcases a permanent auto-learning feature within a network setting, allowing for detecting various network threats through an automated trial-and-error process while steadily refining its detection capabilities. The paper is based on thorough experimentation utilizing the Blended malware dataset, and the results reveal that the proposed DCITD model excels in recognizing a wide array of threats and outperforms similar machine-learning techniques. Those techniques produce a fusion of features to build a model that can be used to recognize and classify the malware images into 31 malware families, then evaluate the performance of malware classification by identifying unique malware families and tracking detection accuracy that reached 98%.
Science Research Society
Title: DCITD: A Deep Q-Network Approach for Cyber Image Threats Detection
Description:
Cybersecurity threats Continuously develop and adapt.
Posing serious risks for companies, governments, and individuals worldwide.
Traditional methods for detecting these threats, which often rely on fixed rules and established patterns, are ineffective against attackers' dynamic and sophisticated tactics.
Detecting cyber threats, especially for malware images, presents a considerable challenge for organizations and individuals.
Conventional detection techniques, which often depend on fixed rules, are increasingly ineffective against the sophisticated strategies utilized by today’s attackers.
That calls for creating more sophisticated and intelligent cyber defense systems, integrating autonomous agents that can learn and make decisions without relying on human knowledge.
This paper employed Reinforcement Learning techniques, which is one of the machine learning fields based on trial and error for learning, to propose the Detection of Cyber Image Threats by the DQN (DCITD) model for malware detection system leveraging Deep Q-Networks (DQN) integrated with image-based reinforcement learning.
The model uses a Convolutional Neural Network (CNN) to feature extraction and incorporates multithreading to optimize experience replay during training.
The DCITD model, utilizing Deep Q-Network (DQN) architecture, showcases a permanent auto-learning feature within a network setting, allowing for detecting various network threats through an automated trial-and-error process while steadily refining its detection capabilities.
The paper is based on thorough experimentation utilizing the Blended malware dataset, and the results reveal that the proposed DCITD model excels in recognizing a wide array of threats and outperforms similar machine-learning techniques.
Those techniques produce a fusion of features to build a model that can be used to recognize and classify the malware images into 31 malware families, then evaluate the performance of malware classification by identifying unique malware families and tracking detection accuracy that reached 98%.
Related Results
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Classification of cyber risks in accounting
Classification of cyber risks in accounting
Introduction. The complexity of information processes in accounting and the improvement of computer and communication technologies led to the variation of accounting information cy...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
ROLES AND RESPONSIBILITIES FOR SCHOOL ROLE PLAYERS IN ADDRESSING CYBER INCIDENTS IN SOUTH AFRICA
ROLES AND RESPONSIBILITIES FOR SCHOOL ROLE PLAYERS IN ADDRESSING CYBER INCIDENTS IN SOUTH AFRICA
Cyber incidents are causing major challenges for school officials who are called upon to respond to these incidents involving learners, globally. Online threats take place off the ...

