Application of Deep Learning in Public Network Security Management

Authors

  • Lihao Fan College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Fujian, China Author
  • Haoran Wang College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Fujian, China Author
  • Yanchuan Zhao College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Fujian, China Author
  • Kaiwen Xin College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Fujian, China Author

DOI:

https://doi.org/10.71222/ttqj0343

Keywords:

deep learning, network security, public management, intrusion detection, malware detection

Abstract

With the rapid advancement of information technology, network security issues have become increasingly prominent, posing significant challenges in the field of public administration. Deep learning, as a cutting-edge technology in artificial intelligence, is emerging as a critical tool for enhancing network security management due to its exceptional performance in big data processing and pattern recognition. This paper reviews the basic concepts of deep learning and its current applications in network security management, discusses the design and implementation of deep learning-based network security management systems, and analyzes their effectiveness and evaluation through specific application cases. The results show that deep learning excels in areas such as intrusion detection, malware detection, network traffic analysis, and anomaly detection, significantly enhancing network security defenses. However, the application of deep learning in network security still faces challenges such as data privacy, model robustness, and computational resources. The paper concludes by proposing future development directions, providing theoretical support and practical references for further improving public network security management.

References

1. Z. Wang, Y. Zhang, X. Li, H. Wang, and J. Chen, "Intrusion detection and network information security based on deep learning algorithm in urban rail transit management system," IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 2135–2143, 2023, doi: 10.1109/TITS.2021.3127681.

2. D. Chen, P. Wawrzynski, and Z. Lv, "Cyber security in smart cities: A review of deep learning-based applications and case studies," Sustain. Cities Soc., vol. 66, pp. 102655–102556, 2021, doi: 10.1016/j.scs.2020.102655.

3. M. A. Ferrag, L. Shu, L. A. Maglaras, X. Xu, and M. Janicke, "Federated deep learning for cyber security in the Internet of Things: Concepts, applications, and experimental analysis," IEEE Access, vol. 9, pp. 138509–138542, 2021, doi: 10.1109/ACCESS.2021.3118642.

4. P. Sharma, J. Kumar, S. N. Singh, and V. Gupta, "Role of machine learning and deep learning in securing 5G-driven industrial IoT applications," Ad Hoc Netw., vol. 123, p. 102685, 2021, doi: 10.1016/j.adhoc.2021.102685.

5. D. Kaushik, S. Kumar, R. Gupta, and A. Verma, "Application of machine learning and deep learning in cybersecurity: An in-novative approach," in An Interdisciplinary Approach to Modern Network Security, CRC Press, 2022, pp. 89–109.

6. M. A. Ferrag, L. Shu, X. Yang, A. Derhab, L. Maglaras, and M. Janicke, "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," J. Inf. Secur. Appl., vol. 50, p. 102419, 2020, doi: 10.1016/j.jisa.2019.102419.

7. L. Gaur, R. M. A. Ujjan, and M. Hussain, "The influence of deep learning in detecting cyber attacks on e-government applica-tions," in Cybersecurity Measures for E-Government Frameworks, IGI Global, 2022, pp. 107–122, doi: 10.4018/978-1-7998-9624-1.ch007.

8. C. Kumar, T. S. Bharati, and S. Prakash, "Online social network security: A comparative review using machine learning and deep learning," Neural Process. Lett., vol. 53, no. 1, pp. 843–861, 2021, doi: 10.1007/s11063-020-10416-3.

Downloads

Published

10 January 2025

Issue

Section

Article

How to Cite

Fan, L., Wang, H., Zhao, Y., & Xin, K. (2025). Application of Deep Learning in Public Network Security Management. Journal of Computer, Signal, and System Research, 2(1), 1-8. https://doi.org/10.71222/ttqj0343