Machine Learning in Cybersecurity: Techniques and Challenges
DOI:
https://doi.org/10.47672/ejt.1486Keywords:
Security, Machine Learning, Survey, Machine Learning, Intrusion Detection, Spam Cybersecurity.Abstract
In the computer world, data science is the force behind the recent dramatic changes in cybersecurity's operations and technologies. The secret to making a security system automated and intelligent is to extract patterns or insights related to security incidents from cybersecurity data and construct appropriate data-driven models. Data science, also known as diverse scientific approaches, machine learning techniques, processes, and systems, is the study of actual occurrences via the use of data. Due to its distinctive qualities, such as flexibility, scalability, and the capability to quickly adapt to new and unknowable obstacles, machine learning techniques have been used in many scientific fields. Due to notable advancements in social networks, cloud and web technologies, online banking, mobile environments, smart grids, etc., cyber security is a rapidly expanding sector that requires a lot of attention. Such a broad range of computer security issues have been effectively addressed by various machine learning techniques. This article covers several machine-learning applications in cyber security. Phishing detection, network intrusion detection, keystroke dynamics authentication, cryptography, human interaction proofs, spam detection in social networks, smart meter energy consumption profiling, and security concerns with machine learning techniques themselves are all covered in this study. The methodology involves collecting a large dataset of phishing and legitimate instances, extracting relevant features such as email headers, content, and URLs, and training a machine-learning model using supervised learning algorithms. Machine learning models can effectively identify phishing emails and websites with high accuracy and low false positive rates. To enhance phishing detection, it is recommended to continuously update the training dataset to include new phishing techniques and to employ ensemble methods that combine multiple machine learning models for better performance.
Downloads
References
Anti-Phishing Working Group, "Phishing and Fraud solutions". [Online]. Available: http://www.antiphishing.org/. [Accesses: April 4, 2013].
Bharadiya, J. P. (2023). A Comprehensive Survey of Deep Learning Techniques Natural Language Processing. European Journal of Technology, 7(1), 58 - 66. https://doi.org/10.47672/ejt.1473
Bharadiya, J. P. (2023). Convolutional Neural Networks for Image Classification. International Journal of Innovative Science and Research Technology, 8(5), 673 - 677. https://doi.org/10.5281/zenodo.7952031
Bharadiya, J. P., Tzenios, N. T., & Reddy, M. (2023). Forecasting of Crop Yield using Remote Sensing Data, Agrarian Factors and Machine Learning Approaches. Journal of Engineering Research and Reports, 24(12), 29-44. https://doi.org/10.9734/jerr/2023/v24i12858
Densham B. Three cyber-security strategies to mitigate the impact of a data breach. Netw Secur. 2015;2015(1):5-8.
Hariri RH, Fredericks EM, Bowers KM. Uncertainty in big data analytics: survey, opportunities, and challenges. J Big Data. 2019;6(1):44.
Knowledge Discovery and Data Mining group, "KDD cup 1999". [Online]. Available: http://www.kdd.org/kddcup/index.php. [Accessed: March 3, 2013].
L. F. Cranor, S. Egelman, J. Hong, and Y. Zhang, "Phinding phish: An evaluation of anti-phishing toolbars", Technical Report CMUCyLab-06-018, CMU, November 2006.
Nallamothu, P. T., & Bharadiya, J. P. (2023). Artificial Intelligence in Orthopedics: A Concise Review. Asian Journal of Orthopaedic Research, 6(1), 17-27. Retrieved from https://journalajorr.com/index.php/AJORR/article/view/164
Qiao L-B, Zhang B-F, Lai Z-Q, Su J-S. Mining of attack models in ids alerts from network backbone by a two-stage clustering method. In: 2012 IEEE 26th international parallel and distributed processing symposium workshops & Phd Forum. IEEE; 2012. p. 1263-9.
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A Comparison of Machine Learning Techniques for Phishing
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Jasmin Praful Bharadiya
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.