APPLICATION OF DEEP LEARNING IN ARTIFICIAL INTELLIGENCE SYSTEMS FOR CYBERATTACK IDENTIFICATION AND PREVENTION

Authors

  • Gergana Varbanova Department of Information Technologies, Nikola Vaptsarov Naval Academy

DOI:

https://doi.org/10.17770/etr2025vol5.8490

Keywords:

Artificial Intelligence, Cybersecurity, Deep Learning, Generative Adversarial Networks

Abstract

Cyberspace has been established as the fifth domain of warfare, alongside land, sea, air, and space. With the increasing complexity and frequency of cyberattacks, traditional security mechanisms are becoming increasingly inadequate, necessitating the integration of Deep Learning (DL) into cybersecurity. The capability of automated detection and prevention of cyber threats through the analysis of large volumes of data, anomaly identification, and attack prediction—threats that would otherwise remain undetected by conventional security systems—plays a crucial role in ensuring cyberspace security. Deep neural networks, such as Recurrent Neural Networks (RNNs), Long Short-Term Memory (LSTM) networks, and autoencoders, are instrumental in analyzing network traffic and user behaviour, enabling the early identification of cyberattacks. Deep learning can also be applied to automate incident response mechanisms. The high-speed analytical capabilities and self-adaptive nature of these models allow for dynamic cybersecurity defenses, including the autonomous blocking of malicious traffic, the identification of compromised systems, and the reduction of response time. Generative Adversarial Networks (GANs) further enhance security by simulating potential cyberattacks, thereby enabling the testing and refinement of defense strategies. However, these same networks can also be exploited for adversarial purposes, such as manipulating input data to deceive AI-driven cybersecurity systems, leading to incorrect classifications or attack predictions. Deep learning represents a transformative advancement in cybersecurity, offering intelligent, automated, and proactive solutions to combat evolving cyber threats. The continued development of adaptive AI-driven security systems will play a pivotal role in enhancing cyber resilience and safeguarding critical infrastructure against emerging cyber threats. The article examines the role of deep learning in cybersecurity, integrating technological aspects and the legal framework of the European Union (GDPR, eIDAS, AI Act) while analyzing the dual-use risk associated with generative adversarial networks (GANs). The emphasis is placed on the significance of biometric data and the necessity of human oversight, as excessive reliance on automated algorithms may lead to a false sense of security and discriminatory effects.

 

References

S. Mircheska, "Perspectives for the Development of Artificial Intelligence: Security Dimension of Artificial Intelligence in the Military Sector," Security and Defense, vol. 2, pp. 43-55, Dec. 2024. Available: https://doi.org/10.70265/ETNV6785

V. Babanov, "Internals of Defense-In-Depth Strategy in Cybersecurity," Security and Defense, vol. 2, pp. 37-42, Dec. 2024. Available: https://doi.org/10.70265/PNEZ3158

S. Lutzkanova, "The Regionalization of European Security and Defense Policies in the Maritime Domain: The Black Sea Case," Pedagogika-Pedagogy, vol. 93, pp. 208-216, 2021. Available: https://doi.org/10.53656/ped21-7s.18def

B. Nikolov and D. Nikolov, "A scenario-based approach to cybersecurity training for seafarers," in Proceedings of the International Association of Maritime Universities Conference 2024, Massachusetts Maritime Academy, United States, 2024, pp. 385–390.

R. Nishat, N. Arif, and A. Bajwa, "A comprehensive review of machine learning and deep learning applications in cybersecurity: an interdisciplinary approach," Academic Journal on Science, Technology, Engineering & Mathematics Education, 2024. Available: https://doi.org/10.69593/ajsteme.v4i04.118

L. Lyubenov, "Domestic Legal Measures for Increasing Security in the Black Sea Region," Security and Defense, vol. 2, pp. 9-18, Dec. 2024. Available: https://doi.org/10.70265/VIRM1297

V. Petrova, "A decision hierarchical model of cybersecurity risk assessment," in Mathematics and Education in Mathematics, Proceedings of the Fiftieth Spring Conference of the Union of Bulgarian Mathematicians, Burgas, Bulgaria, Sept. 2021, pp. 191-195.

A. Kirkov, "Судебно-экспертная деятельность экспертов в Болгарии. Организация и проблемы," in Цифровизация деятельности судов: текущие и перспективные задачи, 2022, pp. 5-9.

M. Oinonen and W. Morsi, "An Automated Wavelet Generation Tool for Cyberattack Detection in Substation Automation Systems," in 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2024, pp. 512-517. Available: https://doi.org/10.1109/CCECE59415.2024.10667244

R. Frick and M. Steinebach, "A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and Their Detection," in Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, 2024. Available: https://doi.org/10.1145/3660354.3660357

I. Nesterova, "Questioning the EU proposal for an Artificial Intelligence Act: The need for prohibitions and a stricter approach to biometric surveillance," Information Polity, 2022. Available: https://doi.org/10.3233/ip-211524

L. eEnqvist, "‘Human oversight’ in the EU Artificial Intelligence Act: What, when and by whom?," Law, Innovation and Technology, vol. 15, pp. 508-535, 2023. Available: https://doi.org/10.1080/17579961.2023.2245683

Downloads

Published

08.06.2025

How to Cite

APPLICATION OF DEEP LEARNING IN ARTIFICIAL INTELLIGENCE SYSTEMS FOR CYBERATTACK IDENTIFICATION AND PREVENTION. (2025). ENVIRONMENT. TECHNOLOGY. RESOURCES. Proceedings of the International Scientific and Practical Conference, 5, 323-327. https://doi.org/10.17770/etr2025vol5.8490