A Review on Deep Learning Approaches and Optimization Techniques For Political Security Threat Prediction

Liyana Zaabar - National Defense University of Malaysia, Kuala Lumpur, Malaysia
Noor Mat Razali - National Defense University of Malaysia, Kuala Lumpur, Malaysia
Khairul Khalil Ishak - Management and Science University, Selangor, Malaysia
Nor Asiakin Abdullah - National Defense University of Malaysia, Kuala Lumpur, Malaysia
Muslihah Wook - National Defense University of Malaysia, Kuala Lumpur, Malaysia


Citation Format:



DOI: http://dx.doi.org/10.62527/joiv.8.3.2204

Abstract


In an era of complex geopolitical dynamics and evolving security threats, the accurate prediction and proactive management of political security risks are imperative. This article provides a comprehensive review of the application of deep learning methodologies and optimization techniques to enhance political security threat prediction. Beginning with analyzing the dynamic landscape of political security threats, the paper emphasizes the necessity for adaptive, data-driven predictive tools. It then delves into the fundamentals of deep learning, elucidating core principles, notable architectural frameworks, and their diverse applications across domains. Expanding upon this foundation, the study evaluates the suitability of deep learning models for addressing the multifaceted challenges associated with political security threat prediction. To maximize the utility of these models, the article explores optimization techniques encompassing hyperparameter tuning, transfer learning, and ensemble strategies, assessing their effectiveness in fine-tuning predictions and bolstering the resilience of threat prediction systems. This review involved the utilization of four journal databases: IEEE, Science Direct, Association for Computing Machinery (ACM), and SpringerLink. We analyzed and examined 39 articles, paying close attention to the different patterns and techniques found within the chosen research framework. Through a critical synthesis of existing research, this review offers insights into the strengths, limitations, and future directions of deep learning-based political security threat prediction, contributing to the ongoing discourse on leveraging artificial intelligence for safeguarding global stability and security.

Keywords


Machine Learning; Deep Learning; Optimization; Political Security; National Security; Sentiment Analysis; Opinion Mining; Threat Prediction

Full Text:

PDF

References


R. M. Alguliyev, Y. N. Imamverdiyev, R. S. Mahmudov, and R. M. Aliguliyev, “Information security as a national security component,” Information Security Journal, pp. 1–18, 2020, doi: 10.1080/19393555.2020.1795323.

S. L. Cosby, “Human Security Concept: The root of U.S National Security and Foreign Policy,” vol. 7, p. 20, 2009.

T. Balzacq, “Qu’est-ce que la sécurité nationale?,” Revue Internationale et Strategique, vol. 52, no. 4, pp. 33–50, 2003, doi: 10.3917/ris.052.0033.

B. Buzan, “New Patterns of Global Security in the Twenty-First Century,” International Affairs (Royal Institute of International Affairs 1944-), vol. 67, no. 3, pp. 431–451, 1991.

B. Bahadur and S. Thakuri, “Conflict over Fiscal Power and Resource Sharing in Federal Nepal View project Master’s degree in Crisis Management Studies View project.” [Online]. Available: https://www.researchgate.net/publication/325414602

N. Kshetri, The quest to cyber superiority: Cybersecurity regulations, frameworks, and strategies of major economies. Springer International Publishing, 2016. doi: 10.1007/978-3-319-40554-4.

D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, “Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement,” BMJ (Online), vol. 339, no. 7716. pp. 332–336, Aug. 08, 2009. doi: 10.1136/bmj.b2535.

B. Kitchenham, “Guidelines for performing Systematic Literature Reviews in Software Engineering,” 2007. [Online]. Available: https://www.researchgate.net/publication/302924724

C. Anderson, K. Nugent, and C. Peterson, “Academic Journal Retractions and the COVID-19 Pandemic,” J Prim Care Community Health, vol. 12, 2021, doi: 10.1177/21501327211015592.

M. Susmitha and S. Razia, “Utilization of deep learning and semantic analysis for opinion mining in information extraction: a review,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 1, p. 469, Apr. 2023, doi: 10.11591/ijeecs.v30.i1.pp469-480.

N. A. M. Razali et al., “Opinion mining for national security: techniques, domain applications, challenges and research opportunities,” J Big Data, vol. 8, no. 1, Dec. 2021, doi: 10.1186/s40537-021-00536-5.

M. Parmar, A. Agrawal, and M. Tech, “A REVIEW ON OPTIMIZATION TECHNIQUES USING DATA MINING Some of the authors of this publication are also working on these related projects: combining object detection techniques with content-based image retrieval (CBIR) systems View project Survey on Association Rule Mining View project A REVIEW ON OPTIMIZATION TECHNIQUES USING DATA MINING,” International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org, p. 616, 2019, [Online]. Available: www.ijrar.org

N. Parveen, P. Chakrabarti, B. T. Hung, and A. Shaik, “Twitter sentiment analysis using hybrid gated attention recurrent network,” J Big Data, vol. 10, no. 1, Dec. 2023, doi: 10.1186/s40537-023-00726-3.

A. S. M. Alharbi and E. de Doncker, “Twitter sentiment analysis with a deep neural network: An enhanced approach using user behavioral information,” Cogn Syst Res, vol. 54, pp. 50–61, May 2019, doi: 10.1016/j.cogsys.2018.10.001.

S. Tam, R. Ben Said, and Ö. Tanriöver, “A ConvBiLSTM Deep Learning Model-Based Approach for Twitter Sentiment Classification,” IEEE Access, vol. 9, pp. 41283–41293, 2021, doi: 10.1109/ACCESS.2021.3064830.

A. Chugh et al., “Spider Monkey Crow Optimization Algorithm with Deep Learning for Sentiment Classification and Information Retrieval,” IEEE Access, vol. 9, pp. 24249–24262, 2021, doi: 10.1109/ACCESS.2021.3055507.

E. S. Alamoudi and N. S. Alghamdi, “Sentiment classification and aspect-based sentiment analysis on yelp reviews using deep learning and word embeddings,” J Decis Syst, vol. 30, no. 2–3, pp. 259–281, 2021, doi: 10.1080/12460125.2020.1864106.

K. L. Tan, C. P. Lee, K. M. Lim, and K. S. M. Anbananthen, “Sentiment Analysis With Ensemble Hybrid Deep Learning Model,” IEEE Access, vol. 10, pp. 103694–103704, 2022, doi: 10.1109/ACCESS.2022.3210182.

K. M. Hasib, M. A. Habib, N. A. Towhid, and M. I. H. Showrov, “A Novel Deep Learning based Sentiment Analysis of Twitter Data for US Airline Service,” in 2021 International Conference on Information and Communication Technology for Sustainable Development, ICICT4SD 2021 - Proceedings, Institute of Electrical and Electronics Engineers Inc., Feb. 2021, pp. 450–455. doi: 10.1109/ICICT4SD50815.2021.9396879.

B. Gaye, D. Zhang, and A. Wulamu, “A tweet sentiment classification approach using a hybrid stacked ensemble technique,” Information (Switzerland), vol. 12, no. 9, Sep. 2021, doi: 10.3390/info12090374.

K. Ahmed et al., “Exploiting Stacked Autoencoders for Improved Sentiment Analysis,” Applied Sciences (Switzerland), vol. 12, no. 23, Dec. 2022, doi: 10.3390/app122312380.

B. Subba and S. Kumari, “A heterogeneous stacking ensemble based sentiment analysis framework using multiple word embeddings,” Comput Intell, vol. 38, no. 2, pp. 530–559, Apr. 2022, doi: 10.1111/coin.12478.

I. H. Sarker, “Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions,” SN Computer Science, vol. 2, no. 6. Springer, Nov. 01, 2021. doi: 10.1007/s42979-021-00815-1.

S. Bashetty, K. Raja, S. Adepu, and A. Jain, “Optimizers in Deep Learning: A Comparative Study and Analysis,” Int J Res Appl Sci Eng Technol, vol. 10, no. 12, pp. 1032–1039, Dec. 2022, doi: 10.22214/ijraset.2022.48050.

N. R. Paul, D. Sahoo, and R. C. Balabantaray, “Classification of crisis-related data on Twitter using a deep learning-based framework,” Multimed Tools Appl, vol. 82, no. 6, pp. 8921–8941, Mar. 2023, doi: 10.1007/s11042-022-12183-w.

A. Alsayat, “Customer decision-making analysis based on big social data using machine learning: a case study of hotels in Mecca,” Neural Comput Appl, vol. 35, no. 6, pp. 4701–4722, Feb. 2023, doi: 10.1007/s00521-022-07992-x.

N. Talpur, S. Jadid Abdulkadir, E. Akashah Patah Akhir, M. Hilmi Hasan, H. Alhussian, and M. Hafizul Afifi Abdullah, “A novel bitwise arithmetic optimization algorithm for the rule base optimization of deep neuro-fuzzy system,” Journal of King Saud University - Computer and Information Sciences, Feb. 2023, doi: 10.1016/j.jksuci.2023.01.020.

H. Swapnarekha, J. Nayak, H. S. Behera, P. B. Dash, and D. Pelusi, “An optimistic firefly algorithm-based deep learning approach for sentiment analysis of COVID-19 tweets,” Mathematical Biosciences and Engineering, vol. 20, no. 2, pp. 2382–2407, 2023, doi: 10.3934/mbe.2023112.

S. Homayoun et al., “DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer,” Future Generation Computer Systems, vol. 90, pp. 94–104, 2019, doi: 10.1016/j.future.2018.07.045.

S. Homayoun et al., “DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer,” Future Generation Computer Systems, vol. 90, pp. 94–104, Jan. 2019, doi: 10.1016/j.future.2018.07.045.

M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet of Things (Netherlands), vol. 7, p. 100059, 2019, doi: 10.1016/j.iot.2019.100059.

M. Abdullahi et al., “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review,” Electronics (Switzerland), vol. 11, no. 2. MDPI, Jan. 01, 2022. doi: 10.3390/electronics11020198.

P. Radoglou-Grammatikis et al., “SPEAR SIEM: A Security Information and Event Management system for the Smart Grid,” Computer Networks, vol. 193, no. September 2020, p. 108008, 2021, doi: 10.1016/j.comnet.2021.108008.

M. Girdhar, J. Hong, W. Su, A. Herath, and C.-C. Liu, “SDN-Based Dynamic Cybersecurity Framework of IEC-61850 Communications in Smart Grid.”

W. Niu, X. Zhang, X. Du, L. Zhao, R. Cao, and M. Guizani, “A deep learning based static taint analysis approach for IoT software vulnerability location,” Measurement (Lond), vol. 152, p. 107139, 2020, doi: 10.1016/j.measurement.2019.107139.

F. Subhan, X. Wu, L. Bo, X. Sun, and M. Rahman, “A deep learning-based approach for software vulnerability detection using code metrics,” IET Software, vol. 16, no. 5, pp. 516–526, Oct. 2022, doi: 10.1049/sfw2.12066.

N. Koroniotis, N. Moustafa, and E. Sitnikova, “A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework,” Future Generation Computer Systems, vol. 110, pp. 91–106, 2020, doi: 10.1016/j.future.2020.03.042.

S. Bhattacharya, Di. Manousakas, A. G. C. P. Ramos, S. I. Venieris, N. D. Lane, and C. Mascolo, “Countering Acoustic Adversarial Attacks in Microphone-equipped Smart Home Devices,” Proc ACM Interact Mob Wearable Ubiquitous Technol, vol. 4, no. 2, 2020, doi: 10.1145/3397332.

S. Bhattacharya, Di. Manousakas, A. G. C. P. Ramos, S. I. Venieris, N. D. Lane, and C. Mascolo, “Countering Acoustic Adversarial Attacks in Microphone-equipped Smart Home Devices,” Proc ACM Interact Mob Wearable Ubiquitous Technol, vol. 4, no. 2, Jun. 2020, doi: 10.1145/3397332.

M. Chowdhury, B. Ray, S. Chowdhury, and S. Rajasegarar, “A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things,” ACM Transactions on Internet of Things, vol. 2, no. 4, pp. 1–23, 2021, doi: 10.1145/3466721.

F. Ullah, M. R. Naeem, A. S. Bajahzar, and F. Al-Turjman, “IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification,” ACM Trans Internet Technol, vol. 22, no. 2, pp. 1–17, 2022, doi: 10.1145/3418206.

J. Chauhan, J. Rajasegaran, S. Seneviratne, A. Misra, A. Seneviratne, and Y. Lee, “Performance Characterization of Deep Learning Models for Breathing-based Authentication on Resource-Constrained Devices,” Proc ACM Interact Mob Wearable Ubiquitous Technol, vol. 2, no. 4, pp. 1–24, 2018, doi: 10.1145/3287036.

C. Douligeris and A. Mitrokotsa, “DDOS ATTACKS AND DEFENSE MECHANISMS: A CLASSIFICATION.”

N. A. M. Razali et al., “Opinion mining for national security: techniques, domain applications, challenges and research opportunities,” J Big Data, vol. 8, no. 1, Dec. 2021, doi: 10.1186/s40537-021-00536-5.

K. Ohtomo, R. Harakawa, M. Iisaka, and M. Iwahashi, “AM-Bi-LSTM: Adaptive multi-modal Bi-LSTM for sequential recommendation,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3355548.

N. A. M. Razali et al., “Opinion mining for national security: techniques, domain applications, challenges and research opportunities,” J Big Data, vol. 8, no. 1, Dec. 2021, doi: 10.1186/s40537-021-00536-5.

G. Badaro et al., “A survey of opinion mining in Arabic: A comprehensive system perspective covering challenges and advances in tools, resources, models, applications, and visualizations,” ACM Transactions on Asian and Low-Resource Language Information Processing, vol. 18, no. 3. Association for Computing Machinery, May 01, 2019. doi: 10.1145/3295662.

M. Ridzwan Yaakub, M. Iqbal Abu Latiffi, and L. Safra Zaabar, “A Review on Sentiment Analysis Techniques and Applications,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Aug. 2019. doi: 10.1088/1757-899X/551/1/012070.

Z. Drus and H. Khalid, “Sentiment analysis in social media and its application: Systematic literature review,” in Procedia Computer Science, Elsevier B.V., 2019, pp. 707–714. doi: 10.1016/j.procs.2019.11.174.

K. M. Carley, “Social cybersecurity: an emerging science,” Comput Math Organ Theory, vol. 26, no. 4, pp. 365–381, Dec. 2020, doi: 10.1007/s10588-020-09322-9.

L. P. Hung and S. Alias, “Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection,” Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 27, no. 1. Fuji Technology Press, pp. 84–95, Jan. 01, 2023. doi: 10.20965/jaciii.2023.p0084.