International Journal of Innovative Research in Computer Science and Technology
Year: 2025, Volume: 13, Issue: 2
First page : ( 6) Last page : ( 13)
Online ISSN : 2350-0557.
DOI: 10.55524/ijircst.2025.13.2.2 |
DOI URL: https://doi.org/10.55524/ijircst.2025.13.2.2
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Shivaraj Yanamandram Kuppuraju , Sharad Shyam Ojha, Mrinal Kumar
Data exfiltration remains a critical cybersecurity threat, particularly in edge computing environments where vast amounts of sensitive information are processed and transmitted. Traditional security mechanisms often struggle to detect sophisticated data breaches due to their reliance on predefined rules and signatures. This study proposes a deep learning-based approach for real-time detection of data exfiltration, leveraging transformer, CNN, and RNN architectures to analyze network traffic patterns and identify malicious activities. The transformer-based model demonstrated superior performance, achieving a detection accuracy of 96.3%, with lower false positive and false negative rates compared to CNN and RNN models. The proposed solution effectively minimizes alert fatigue by reducing false positives while ensuring high recall rates to detect unauthorized data transfers with minimal oversight. Additionally, the model's computational efficiency makes it well-suited for deployment in resource-constrained edge computing environments. Experimental results highlight the robustness of the approach against adversarial evasion techniques, emphasizing its potential for real-world cybersecurity applications. The study also explores the integration of continuous learning mechanisms and explainable AI to enhance model adaptability and interpretability. These findings suggest that deep learning-based detection methods can significantly improve data security in edge computing, providing a scalable and effective solution to mitigate data exfiltration threats in dynamic and distributed environments.
Senior Manager of Threat Detections, Amazon, Austin, Texas, United States
No. of Downloads: 31 | No. of Views: 1635
Rehan Raja, Hiba Saleem, Shayan Ahmad, Mohd Arslaan, Nida Khan.
May 2025 - Vol 13, Issue 3
Shivangi Srivastava.
May 2025 - Vol 13, Issue 3
Abdullah Mazharuddin Khaja, Michidmaa Arikhad, Yawar Hayat, Saad Rasool.
May 2025 - Vol 13, Issue 3