Machine Learning in Cybersecurity: Techniques and Challenges

Authors

  • Jasmin Praful Bharadiya Doctor of Philosophy Information Technology, University of the Cumberlands, USA

DOI:

https://doi.org/10.47672/ejt.1486
Abstract views: 3622
PDF downloads: 2470

Keywords:

Security, Machine Learning, Survey, Machine Learning, Intrusion Detection, Spam Cybersecurity.

Abstract

In the computer world, data science is the force behind the recent dramatic changes in cybersecurity's operations and technologies. The secret to making a security system automated and intelligent is to extract patterns or insights related to security incidents from cybersecurity data and construct appropriate data-driven models. Data science, also known as diverse scientific approaches, machine learning techniques, processes, and systems, is the study of actual occurrences via the use of data. Due to its distinctive qualities, such as flexibility, scalability, and the capability to quickly adapt to new and unknowable obstacles, machine learning techniques have been used in many scientific fields. Due to notable advancements in social networks, cloud and web technologies, online banking, mobile environments, smart grids, etc., cyber security is a rapidly expanding sector that requires a lot of attention. Such a broad range of computer security issues have been effectively addressed by various machine learning techniques. This article covers several machine-learning applications in cyber security. Phishing detection, network intrusion detection, keystroke dynamics authentication, cryptography, human interaction proofs, spam detection in social networks, smart meter energy consumption profiling, and security concerns with machine learning techniques themselves are all covered in this study. The methodology involves collecting a large dataset of phishing and legitimate instances, extracting relevant features such as email headers, content, and URLs, and training a machine-learning model using supervised learning algorithms. Machine learning models can effectively identify phishing emails and websites with high accuracy and low false positive rates. To enhance phishing detection, it is recommended to continuously update the training dataset to include new phishing techniques and to employ ensemble methods that combine multiple machine learning models for better performance.

 

Downloads

Download data is not yet available.

Author Biography

Jasmin Praful Bharadiya, Doctor of Philosophy Information Technology, University of the Cumberlands, USA

 

 

References

Anti-Phishing Working Group, “Phishing and Fraud solutions”. [Online]. Available: http://www.antiphishing.org/. [Accesses: April 4, 2013].

Bharadiya, J. P. (2023). A Comprehensive Survey of Deep Learning Techniques Natural Language Processing. European Journal of Technology, 7(1), 58 - 66. https://doi.org/10.47672/ejt.1473

Bharadiya, J. P. (2023). Convolutional Neural Networks for Image Classification. International Journal of Innovative Science and Research Technology, 8(5), 673 - 677. https://doi.org/10.5281/zenodo.7952031

Bharadiya, J. P., Tzenios, N. T., & Reddy, M. (2023). Forecasting of Crop Yield using Remote Sensing Data, Agrarian Factors and Machine Learning Approaches. Journal of Engineering Research and Reports, 24(12), 29–44. https://doi.org/10.9734/jerr/2023/v24i12858

Densham B. Three cyber-security strategies to mitigate the impact of a data breach. Netw Secur. 2015;2015(1):5–8.

Hariri RH, Fredericks EM, Bowers KM. Uncertainty in big data analytics: survey, opportunities, and challenges. J Big Data. 2019;6(1):44.

Knowledge Discovery and Data Mining group, “KDD cup 1999”. [Online]. Available: http://www.kdd.org/kddcup/index.php. [Accessed: March 3, 2013].

L. F. Cranor, S. Egelman, J. Hong, and Y. Zhang, “Phinding phish: An evaluation of anti-phishing toolbars”, Technical Report CMUCyLab-06-018, CMU, November 2006.

Nallamothu, P. T., & Bharadiya, J. P. (2023). Artificial Intelligence in Orthopedics: A Concise Review. Asian Journal of Orthopaedic Research, 6(1), 17–27. Retrieved from https://journalajorr.com/index.php/AJORR/article/view/164

Qiao L-B, Zhang B-F, Lai Z-Q, Su J-S. Mining of attack models in ids alerts from network backbone by a two-stage clustering method. In: 2012 IEEE 26th international parallel and distributed processing symposium workshops & Phd Forum. IEEE; 2012. p. 1263–9.

S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, “A Comparison of Machine Learning Techniques for Phishing

Downloads

Published

2023-06-02

How to Cite

Bharadiya, J. . (2023). Machine Learning in Cybersecurity: Techniques and Challenges. European Journal of Technology, 7(2), 1 - 14. https://doi.org/10.47672/ejt.1486

Issue

Section

Articles