TOWARDS SMARTER CYBER DEFENSE: LEVERAGING DEEP LEARNING FOR THREAT IDENTIFICATION AND PREVENTION
Abstract
The increasing sophistication of cyber threats has rendered traditional security measures inadequate, necessitating the adoption of deep learning-based techniques for enhanced threat detection and prevention. This study develops a Sequential Neural Network (SNN) model to improve cybersecurity defenses by identifying malicious activities with greater accuracy. The model is trained on the CERT Insider Threat v6.2 datasets, utilizing user activity modeling to detect anomalous behavior effectively. Performance evaluation reveals that the model achieved an accuracy of 67%, with precision, recall, and F1-score all at 0.67, indicating a balanced but moderate classification capability. The AUC-ROC score of 0.67 further suggests that while the model surpasses random classification, refinements are necessary for practical deployment. The confusion matrix analysis highlights challenges in distinguishing between certain cyber threats, resulting in misclassifications and false positives. Despite these challenges, the proposed deep learning approach demonstrates the potential of SNNs in cybersecurity by detecting complex attack patterns that traditional methods often fail to recognize. However, issues such as class imbalance, interpretability, and computational overhead must be addressed to improve model robustness. Future research will focus on enhancing model architectures, optimizing hyperparameters, and integrating explainable AI techniques to improve detection accuracy and reduce false positive rates. By leveraging deep learning, this study contributes to the development of smarter and more adaptive cybersecurity solutions, capable of responding to evolving threats in real time.
References
Ahmed, Sabbir, Sameera Mubarak, Jia Tina Du, and Santoso Wibowo. 2022. Forecasting the Status of Municipal Waste in Smart Bins Using Deep Learning. International Journal of Environmental Research and Public Health 19(24):16798. https://doi.org/10.3390/ijerph192416798. DOI: https://doi.org/10.3390/ijerph192416798
Andrysiak, Tomasz, and ukasz Saganowski. 2011. Anomaly Detection System Based on Sparse Signal Representation. IPC 16(34):3744. https://doi.org/10.2478/v10248-012-0010-6. DOI: https://doi.org/10.2478/v10248-012-0010-6
Andrysiak, Tomasz, ukasz Saganowski, and Micha Chora. 2013. Greedy Algorithms for Network Anomaly Detection. Pp. 23544 in International Joint Conference CISIS12-ICEUTE12-SOCO12 Special Sessions. Vol. 189, Advances in Intelligent Systems and Computing, edited by . Herrero, V. Snel, A. Abraham, I. Zelinka, B. Baruque, H. Quintin, J. L. Calvo, J. Sedano, and E. Corchado. Berlin, Heidelberg: Springer Berlin Heidelberg.
Chahal, Sunil. 2023. AI-Enhanced Cyber Incident Response and Recovery. International Journal of Science and Research (IJSR) 12(3):17951801. https://doi.org/10.21275/SR231003163025. DOI: https://doi.org/10.21275/SR231003163025
Chukwu, Nnaji, Simo Yufenyuy, Eunice Ejiofor, Darlington Ekweli, Oluwadamilola Ogunleye, Tosin Clement, Callistus Obunadike, Sulaimon Adeniji, Emmanuel Elom, and Chinenye Obunadike. 2024. Resilient Chain: AI-Enhanced Supply Chain Security and Efficiency Integration. International Journal of Scientific and Management Research 07(03):4665. https://doi.org/10.37502/IJSMR.2024.7306. DOI: https://doi.org/10.37502/IJSMR.2024.7306
Fatima Abbas Maikano. 2024. MACHINE LEARNING APPROACHES FOR CYBER BULLYING DETECTION IN HAUSA LANGUAGE SOCIAL MEDIA: A COMPREHENSIVE REVIEW AND ANALYSIS. FUDMA Journal of Sciences (FJS) 8(3):pp 344-348.
Garba, Muhammad, Musa Usman, and Muhammad Saidu. 2025. ENHANCING EMPLOYEE ATTRITION PREDICTION: THE IMPACT OF DATA PREPROCESSING ON MACHINE LEARNING MODEL PERFORMANCE. FUDMA JOURNAL OF SCIENCES 9(1):20510. https://doi.org/10.33003/fjs-2025-0901-3030. DOI: https://doi.org/10.33003/fjs-2025-0901-3030
Hesham, Momen, Mohamed Essam, Mohamed Bahaa, Ahmed Mohamed, Mohamed Gomaa, Mena Hany, and Wael Elsersy. 2024. Evaluating Predictive Models in Cybersecurity: A Comparative Analysis of Machine and Deep Learning Techniques for Threat Detection. DOI: https://doi.org/10.1109/IMSA61967.2024.10652833
J. Zhang, L. Pan, Q. -L. Han, C. Chen, S. Wen and Y. Xiang,. 2020. Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Surveylearning. IEEE/CAA Journal of Automatica Sinica 9(3). https://doi.org/10.1109/JAS.2021.1004261. DOI: https://doi.org/10.1109/JAS.2021.1004261
Khuda, Kudrat-E. 2021. Electronic Waste in Bangladesh: Its Present Statutes, and Negative Impacts on Environment and Human Health. Pollution 7(3). https://doi.org/10.22059/poll.2021.321337.1056.
Kozik, Rafal, and Michal Choras. 2015. Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System. Pp. 72429 in 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). Krakow, Poland: IEEE. DOI: https://doi.org/10.1109/3PGCIC.2015.88
Kuttiyappan, Damodharan, and Rajasekar V. 2024. AI-Enhanced Fraud Detection: Novel Approaches and Performance Analysis. in Proceedings of the 1st International Conference on Artificial Intelligence, Communication, IoT, Data Engineering and Security, IACIDS 2023, 23-25 November 2023, Lavasa, Pune, India. Lavasa, India: EAI. DOI: https://doi.org/10.4108/eai.23-11-2023.2343170
Mohammadi, Alireza, Hosna Ghahramani, and Seyyed Amir Asghari. n.d. Securing Healthcare with Deep Learning: A CNN- Based Model for Medical IoT Threat Detection.
Ogonowski, Aleksander, Micha ebrowski, Arkadiusz wiek, Tobiasz Jarosiewicz, Konrad Klimaszewski, Adam Padee, Piotr Wasiuk, and Micha Wjcik. 2024. Preliminary Study on Artificial Intelligence Methods for Cybersecurity Threat Detection in Computer Networks Based on Raw Data Packets.
Oise, Godfrey. 2023. A Web Base E-Waste Management and Data Security System. RADINKA JOURNAL OF SCIENCE AND SYSTEMATIC LITERATURE REVIEW 1(1):4955. https://doi.org/10.56778/rjslr.v1i1.113. DOI: https://doi.org/10.56778/rjslr.v1i1.113
Oise, Godfrey, and Susan Konyeha. 2024. E-WASTE MANAGEMENT THROUGH DEEP LEARNING: A SEQUENTIAL NEURAL NETWORK APPROACH. FUDMA JOURNAL OF SCIENCES 8(3):1724. https://doi.org/0.33003/fjs-2024-0804-2579. DOI: https://doi.org/10.33003/fjs-2024-0804-2579
Oise, Godfrey Perfectson, and Susan Konyeha. 2024. Deep Learning System for E-Waste Management. P. 66 in The 3rd International Electronic Conference on Processes. MDPI. DOI: https://doi.org/10.3390/engproc2024067066
Sewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. 2022. Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. Pp. 5172 in Vol. 1549. DOI: https://doi.org/10.1007/s10796-022-10333-x
Sumit KR Sharma. 2024. AI-Enhanced Cyber Threat Detection and Response Systems. Journal of Artificial Intelligence and Machine Learning 1(2). doi: ORCID: https://orcid.org/0000-0001-6546-0348. DOI: https://doi.org/10.36676/ssjaiml.v1.i2.14
Tuor, Aaron, Samuel Kaplan, Brian Hutchinson, Nicole Nichols, and Sean Robinson. 2017. Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams.
Vangasam Mounika and B.Reddemma. 2022. Detecting Cyber Attacks by Applying MachineLearning Techniques. International Journal of Engineering Technology and Management Sciences 6(5):64551. https://doi.org/10.46647/ijetms.2022.v06i05.101 DOI: https://doi.org/10.46647/ijetms.2022.v06i05.101
Copyright (c) 2025 FUDMA JOURNAL OF SCIENCES

This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences