Skip to main content

Integrating Deepfake Detection into Cybersecurity Curriculum

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2020, Volume 1 (FTC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1288))

Included in the following conference series:

Abstract

Deep Learning (DL) has been widely adopted in the domain of cybersecurity to address a variety of security and privacy concerns. Moreover, in recent years attackers are also increasingly adopting deep learning to either develop new sophisticated DL-based security attacks, such as Deepfakes. Recently Deepfake technology is used to spread misinformation on social networking. Currently, the most popular algorithm for deepfake image generation is GANs. The goal of this paper is to adopt DL-based smart detection techniques to defend against smart misinformation. We develop a set of hands-on labs to integrate them in our cybersecurity curriculum so that our students, future cybersecurity professionals, can be educated to use detect software and identify Deepfakes. Finally, we will investigate the fundamental capabilities, challenges, and limitations of deep learning for detecting smart attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 38–45 (2019)

    Google Scholar 

  2. Albahar, M., Almalki, J.: Deepfakes: threats and countermeasures systematic review. J. Theor. Appl. Inf. Technol. 97(22), 3242–3250 (2019)

    Google Scholar 

  3. Chi, H., Aderibigbe, T., Granville, B.C.: A framework for IoT data acquisition and forensics analysis. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5142–5146. IEEE (2018)

    Google Scholar 

  4. Güera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6, November 2018

    Google Scholar 

  5. Huang, Y., Juefei-Xu, F., Wang, R., Guo, Q., Ma, L., Xie, X., Li, J., Miao, W., Liu, Y., Pu, G.: Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction. arXiv preprint arXiv:2006.07533 (2020)

  6. Iperov. iperov/deepfacelab, January 2020

    Google Scholar 

  7. Maras, M.-H., Alexandrou, A.: Determining authenticity of video evidence in the age of artificial intelligence and in the wake of Deepfake videos. Int. J. Evid. Proof 23(3), 255–262 (2019)

    Article  Google Scholar 

  8. Newman, L.H.: To fight Deepfakes, researchers built a smarter camera, May 2019

    Google Scholar 

  9. Nguyen, H.H., Yamagishi, J., Echizen, I.: Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2307–2311. IEEE (2019)

    Google Scholar 

  10. Nguyen, T.T., Nguyen, C.M., Nguyen, D.T., Nguyen, D.T., Nahavandi, S.: Deep learning for deepfakes creation and detection. arXiv preprint arXiv:1909.11573 (2019)

  11. Shen, T., Liu, R., Bai, J., Li, Z.: “deep fakes” using generative adversarial networks (GAN) (2018)

    Google Scholar 

  12. Soceanu, A., Vasylenko, M., Gradinaru, A.: Improving cybersecurity skills using network security virtual labs. In: Proceedings of the International MultiConference of Engineers and Computer Scientists 2017 Vol II, IMECS (2017)

    Google Scholar 

  13. Tariq, S., Lee, S., Kim, H., Shin, Y., Woo, S.S.: Detecting both machine and human created fake face images in the wild. In: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, pp. 81–87. ACM (2018)

    Google Scholar 

  14. Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: A survey of face manipulation and fake detection. arXiv preprint arXiv:2001.00179 (2020)

  15. Verdoliva., L.: Media forensics and deepfakes: an overview. arXiv preprint arXiv:2001.06564 (2020)

  16. Vincent, J.: Deepfake detection algorithms will never be enough, June 2019

    Google Scholar 

  17. Wahsheh, L.A., Mekonnen, B:. Practical cyber security training exercises. In: 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 48–53. IEEE (2019)

    Google Scholar 

  18. Xu, W., Yan, J., Chi, H.: A forensic evidence acquisition model for data leakage attacks. In: 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 53–58. IEEE (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongmei Chi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chi, H., Maduakor, U., Alo, R., Williams, E. (2021). Integrating Deepfake Detection into Cybersecurity Curriculum. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Proceedings of the Future Technologies Conference (FTC) 2020, Volume 1. FTC 2020. Advances in Intelligent Systems and Computing, vol 1288. Springer, Cham. https://doi.org/10.1007/978-3-030-63128-4_45

Download citation

Publish with us

Policies and ethics