Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms

G. Kabanda
{"title":"Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms","authors":"G. Kabanda","doi":"10.5220/0010789900003167","DOIUrl":null,"url":null,"abstract":"The purpose of the research is to evaluate Machine Learning and Big Data Analytics 7 paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, 8 processes and operations that are framed to protect information systems, computers, devices, 9 programs, data and networks from internal or external threats, harm, damage, attacks or 10 unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data 11 analysis of large data sets and production of models for the general relationships found among 12 data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, 13 unsupervised, semi-supervised, and reinforcement learning algorithms. collected of opportunity 30 for cyber crimes and other forms cybersecurity risks, especially among interconnected devices now at household 31 level. 32 The research paper is focused on the Performance of Machine Learning and Big Data Analytics paradigms in 33 Cybersecurity and Cloud Computing platforms. The purpose of the research is to evaluate Machine Learning 34 and Big Data Analytics paradigms for use in Cybersecurity. This is relevant due to the rapid advances in 35 machine learning (ML) and deep learning (DL) as we explore the potency of efficient and cost-effective cloud 36 computing platforms and services. Evaluation of the attacks and defenses using ML and Big Data paradigms 37 is the key subject of this research paper. However, ML and DL techniques are resource intensive and require 38 huge volumes of training data with excellent performance, as is often provided by computational resources such 39 as high-performance graphics processing units (GPUs) and tensor processing units. Security issues related to 40 virtualisation, containerization, network monitoring, data protection and attack detection are interrogated whilst 41 strengthening AI/ML/DL security solutions that involve encryption, access control, firewall, authentication and 42 intrusion detection and prevention systems at the appropriate Fog/Cloud level. 43 Cybersecurity consolidates the confidentiality, integrity, and availability of computing resources, networks, 44 software programs, and data into a coherent collection of policies, technologies, processes, and techniques 45","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0010789900003167","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

The purpose of the research is to evaluate Machine Learning and Big Data Analytics 7 paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, 8 processes and operations that are framed to protect information systems, computers, devices, 9 programs, data and networks from internal or external threats, harm, damage, attacks or 10 unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data 11 analysis of large data sets and production of models for the general relationships found among 12 data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, 13 unsupervised, semi-supervised, and reinforcement learning algorithms. collected of opportunity 30 for cyber crimes and other forms cybersecurity risks, especially among interconnected devices now at household 31 level. 32 The research paper is focused on the Performance of Machine Learning and Big Data Analytics paradigms in 33 Cybersecurity and Cloud Computing platforms. The purpose of the research is to evaluate Machine Learning 34 and Big Data Analytics paradigms for use in Cybersecurity. This is relevant due to the rapid advances in 35 machine learning (ML) and deep learning (DL) as we explore the potency of efficient and cost-effective cloud 36 computing platforms and services. Evaluation of the attacks and defenses using ML and Big Data paradigms 37 is the key subject of this research paper. However, ML and DL techniques are resource intensive and require 38 huge volumes of training data with excellent performance, as is often provided by computational resources such 39 as high-performance graphics processing units (GPUs) and tensor processing units. Security issues related to 40 virtualisation, containerization, network monitoring, data protection and attack detection are interrogated whilst 41 strengthening AI/ML/DL security solutions that involve encryption, access control, firewall, authentication and 42 intrusion detection and prevention systems at the appropriate Fog/Cloud level. 43 Cybersecurity consolidates the confidentiality, integrity, and availability of computing resources, networks, 44 software programs, and data into a coherent collection of policies, technologies, processes, and techniques 45
机器学习和大数据分析范式在网络安全和云计算平台中的性能
该研究的目的是评估机器学习和大数据分析7范式在网络安全中的应用。网络安全是指旨在保护信息系统、计算机、设备、程序、数据和网络免受内部或外部威胁、伤害、破坏、攻击或未经授权访问的技术、流程和操作的组合。机器学习(ML)的主要特点是对大型数据集进行自动数据分析,并为12个数据之间的一般关系建立模型。机器学习算法作为人工智能的一部分,可以分为监督学习算法、无监督学习算法、半监督学习算法和强化学习算法。收集了网络犯罪和其他形式的网络安全风险的机会,特别是在家庭级的互联设备中。该研究论文主要关注机器学习和大数据分析范式在33个网络安全和云计算平台中的性能。该研究的目的是评估机器学习和大数据分析范式在网络安全中的应用。这与机器学习(ML)和深度学习(DL)的快速发展有关,因为我们正在探索高效且具有成本效益的云计算平台和服务的潜力。利用机器学习和大数据范式评估攻击和防御是本研究论文的关键主题。然而,ML和DL技术是资源密集型的,需要大量性能优异的训练数据,这通常是由高性能图形处理单元(gpu)和张量处理单元等计算资源提供的。与40个虚拟化、容器化、网络监控、数据保护和攻击检测相关的安全问题被询问,同时41个加强AI/ML/DL安全解决方案涉及加密、访问控制、防火墙、身份验证和42个适当雾/云级别的入侵检测和预防系统。网络安全将计算资源、网络、软件程序和数据的机密性、完整性和可用性整合为一系列连贯的策略、技术、流程和技巧
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信