Cybersecurity and Cyber Forensics: Machine Learning Approach

Ibrahim Goni, J. M. Gumpy, T. U. Maigari, Murtala Muhammad, Abdulrahman Saidu
{"title":"Cybersecurity and Cyber Forensics: Machine Learning Approach","authors":"Ibrahim Goni, J. M. Gumpy, T. U. Maigari, Murtala Muhammad, Abdulrahman Saidu","doi":"10.30564/ssid.v2i2.2495","DOIUrl":null,"url":null,"abstract":"We live in a connected world of digital devices which include mobile devices, workstations, control systems, transportation systems, base stations, satellites of different interconnected networks, Global positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses software and predefined techniques which is aim at extracting evidences from any form of digital device and can be presented to a court of law for criminal and/or civil proceedings provided that it satisfy this three conditions; comprehensiveness, authenticity and objectivity. Cyber space is recently considered a domain worth exploring and investigating and securing after lithosphere, hydrosphere, biosphere and atmosphere. Cyber threats, attacks and breaches have become a normal incident in day-to-day life of internet users. However, it is noted that cybersecurity is based on confidentiality, integrity and validity of data. In this research work machine learning algorithms applied to cybersecurity and cyber forensics are clearly explored and pave away for further research directions on the application of deep learning, computational intelligence, soft computing to cybersecurity and cyber forensics.","PeriodicalId":315789,"journal":{"name":"Semiconductor Science and Information Devices","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Semiconductor Science and Information Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30564/ssid.v2i2.2495","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

We live in a connected world of digital devices which include mobile devices, workstations, control systems, transportation systems, base stations, satellites of different interconnected networks, Global positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses software and predefined techniques which is aim at extracting evidences from any form of digital device and can be presented to a court of law for criminal and/or civil proceedings provided that it satisfy this three conditions; comprehensiveness, authenticity and objectivity. Cyber space is recently considered a domain worth exploring and investigating and securing after lithosphere, hydrosphere, biosphere and atmosphere. Cyber threats, attacks and breaches have become a normal incident in day-to-day life of internet users. However, it is noted that cybersecurity is based on confidentiality, integrity and validity of data. In this research work machine learning algorithms applied to cybersecurity and cyber forensics are clearly explored and pave away for further research directions on the application of deep learning, computational intelligence, soft computing to cybersecurity and cyber forensics.
网络安全和网络取证:机器学习方法
我们生活在一个数字设备的互联世界,包括移动设备、工作站、控制系统、运输系统、基站、不同互联网络的卫星、全球定位系统(GPS)及其相关的电子服务,其中互联网为全球这些设备的连接提供了平台。网络取证作为计算机安全的一个分支,使用软件和预定义的技术,旨在从任何形式的数字设备中提取证据,并在满足以下三个条件的情况下,可提交法院进行刑事和/或民事诉讼;全面、真实、客观。网络空间最近被认为是继岩石圈、水圈、生物圈和大气之后值得探索、调查和保护的领域。网络威胁、网络攻击、网络违规已经成为互联网用户日常生活中的常态。然而,需要指出的是,网络安全的基础是数据的保密性、完整性和有效性。本研究工作明确探索了机器学习算法在网络安全和网络取证中的应用,为深度学习、计算智能、软计算在网络安全和网络取证中的应用开辟了进一步的研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信