International Journal of Innovative Research in Engineering and Management
Year: 2025, Volume: 13, Issue: 2
First page : ( 6) Last page : ( 13)
Online ISSN : 2350-0557.
DOI: 10.55524/ijircst.2025.13.2.2 |
DOI URL: https://doi.org/10.55524/ijircst.2025.13.2.2
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Shivaraj Yanamandram Kuppuraju , Sharad Shyam Ojha, Mrinal Kumar
Data exfiltration remains a critical cybersecurity threat, particularly in edge computing environments where vast amounts of sensitive information are processed and transmitted. Traditional security mechanisms often struggle to detect sophisticated data breaches due to their reliance on predefined rules and signatures. This study proposes a deep learning-based approach for real-time detection of data exfiltration, leveraging transformer, CNN, and RNN architectures to analyze network traffic patterns and identify malicious activities. The transformer-based model demonstrated superior performance, achieving a detection accuracy of 96.3%, with lower false positive and false negative rates compared to CNN and RNN models. The proposed solution effectively minimizes alert fatigue by reducing false positives while ensuring high recall rates to detect unauthorized data transfers with minimal oversight. Additionally, the model's computational efficiency makes it well-suited for deployment in resource-constrained edge computing environments. Experimental results highlight the robustness of the approach against adversarial evasion techniques, emphasizing its potential for real-world cybersecurity applications. The study also explores the integration of continuous learning mechanisms and explainable AI to enhance model adaptability and interpretability. These findings suggest that deep learning-based detection methods can significantly improve data security in edge computing, providing a scalable and effective solution to mitigate data exfiltration threats in dynamic and distributed environments.
Senior Manager of Threat Detections, Amazon, Austin, Texas, United States
No. of Downloads: 7 | No. of Views: 267
Shiva Kiran Lingishetty, Chandrashekhar Moharir, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Dr. Vishal Kishorchandra Pandya, Joshi Keyur Ramesh, Modha Vivek Pankajbhai.
March 2025 - Vol 13, Issue 2
Zahra Jabeen, Khusboo Mishra, Binay Kumar Mishra.
March 2025 - Vol 13, Issue 2