Search this site
Embedded Files
ARRAK
  • About
  • Gallery
  • Portfolio
    • Skills
    • Education
    • Experiences
    • R&D
      • Interests
      • Coding
        • Repositories
      • Projects
        • Repositories
        • Miscellaneous
          • AI/ML
          • Web Applications
          • Android Applications
          • Desktop Applications
          • Arduino Projects
          • Audio Engineering
      • Thesis
        • BSc
        • MSc
        • PhD
      • Publications
        • Repositories
        • Miscellaneous
      • Reviewer (R&D)
        • Springer Nature
    • Accomplishments
    • Compulsory Extracurricular Activities
      • Repositories
      • Miscellaneous
    • News/Events
  • Blog
    • LFoC
      • Palindrome Number
      • Perfect Number
      • Factorial Using Recursion and Loop
      • GCD and LCM
      • Prime Number
      • Prime Factors
      • Fibonacci series using recursion
      • Binary to Decimal
      • Decimal to Binary
      • nCr
      • Pattern Matching
      • Pattern Matching simple pattern
      • Number Pattern
      • Pascal Number Pattern
      • Armstrong Number
      • Swapping without using third variable
      • Reverse Array
      • Insert an element in an array
      • Remove element from array
      • Merge two arrays
      • Print a string using a loop
      • Reverse a string
      • Word Count
    • OotFC
      • 22
      • ssiidan
      • taskinsoso13
      • hi
    • Frameworks
      • Angular
    • FirmsIT
      • Viva
        • .Net
          • Notions
          • GSA
          • VS
          • PBS
    • Cyber Security
      • New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products
      • Top 10 Cybersecurity Trends to Expect in 2025
      • City Bank data breach: Client financial statements sold on underground foru
      • Hacked Chrome extensions put 2.6 million users at risk of data leak
      • Study Guide
    • ARRAKPP CI
      • MCQ
        • Combined Bank - Sonali & Janata Bank
        • Copy of Combined Bank - Sonali & Janata Bank
      • Written
        • IBBL
        • BB
        • SB/JB
        • UB
        • CB
        • BcB
        • C5B
        • BTV
        • CCB
        • DESCO
      • Subjective
        • Data Structure & Algorithm
          • Data Structures
          • Complexity
          • Array
          • Linked List
          • Stack
          • Queue
          • Tree
          • Binary Tree
          • Binary Search Tree
          • Searching
          • Balanced Tree
          • Searching Traversals
          • Sorting Algorithm
          • Algorithm
        • OOP
          • Concepts
          • Constructor Overloading
          • Destructor
          • Inheritance
          • Polymorphism: Method Overloading
          • Polymorphism: Method Overriding
          • Abstract Class
          • Abstraction: Interface
          • Encapsulation
        • Database
          • Query
        • Data Comm. & Networking
          • OSI Model
          • Private IP Address
    • ARRAKPP BCS
      • Preliminary
        • English Language
        • English Literature
        • General Science
        • Intelligence Quotient (IQ)
    • ARRAKPP ISSB
      • ISSB v1
      • ISSB v2
      • ISSB v3
      • CAPITALS
      • BANGLADESH ARMY
      • BANGLADESH NAVY
      • WAT
    • ARRAPP Deen-e-Islam
      • দোআ
        • দৈনন্দিন
        • বিবিধ
    • ARRAKPPSEASL - R&D
      • Assessing Customer Churn Using Machine Learning
      • Customer Analytics: Preparing Data for Modeling
      • From Data to Dollars - Predicting Insurance Charges
      • Detecting Cybersecurity Threats using Deep Learning
      • Modern cybersecurity defense
      • OPCA: Taxonomy, Mechanisms, and Case Studies of Prominent Cyber Threats in
      • COMCD - A Comprehensive Overview of Modern Cybersecurity Defenses: From Mal
      • A Flexible and Scalable Role-Based Authorization System for .NET Applicatio
      • A Toolkit for Flexible and Scalable Fuzzy Record Linkage
      • Adherence App
      • CEFFRL
      • DIABWSwS
      • Bowl Sound Analysis
      • Cross-Platform Lost Finder
      • ML-ASPA
      • ABWSwS
      • Medication Alert
  • Contact
ARRAK

<<< Detecting Cybersecurity Threats using Deep Learning

Abstract:

Cyber threats have emerged as a significant challenge for organizations worldwide, manifesting in diverse forms such as malware, phishing, and denial-of-service (DoS) attacks. These threats compromise sensitive information, disrupt critical operations, and continue to increase in both frequency and sophistication. Traditional detection mechanisms often struggle to adapt to evolving attack patterns, creating the need for more advanced and intelligent solutions. Deep learning models offer a promising approach by enabling the analysis of large-scale data and the identification of subtle, non-obvious patterns that human analysts might overlook.

This study proposes the design and implementation of a deep learning model for cyber threat detection using the BETH dataset, which simulates real-world log events. The dataset includes features such as process identifiers, thread activity, user IDs, argument counts, and return values, with a binary label (sus_label) denoting whether an event is malicious or benign. By leveraging this dataset, the model aims to proactively detect suspicious activities and enhance threat mitigation strategies. The outcomes of this work contribute to strengthening organizational cybersecurity measures, ensuring the protection of sensitive data, and maintaining operational resilience against emerging cyber threats.

#LostFinderRevolution #CrossPlatformLocator #MLAcousticTracking #EfficientRecoveryTech #VersatileLostItemTracker #AcousticSignalFinder #SeamlessMLTracking #EnhancedLocationRecovery #AdvancedLostItemSystem #AdaptableAcousticLocator #AbdurRahimRatulAliKhan

>>>

LinkLinkLinkLinkGitHubLinkLinkLinkedIn
YouTubeInstagramFacebook

Contact 

Email: abdurrahimratulalikhan [at] gmail [dot] com Dhaka, Bangladesh 
© 2025  ARRAK  |  All Rights Reserved  |  Terms  |  Privacy & Cookies Policy
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse