The Empirical Analysis of Machine Learning Approaches for Enhancing the Cyber security for better Quality

Korakod Tongkachok, V. Samata, Nethravathi K, M. Nirmal, Lakshmikanth Rajat Mohan, Zarrarahmed Khan
{"title":"The Empirical Analysis of Machine Learning Approaches for Enhancing the Cyber security for better Quality","authors":"Korakod Tongkachok, V. Samata, Nethravathi K, M. Nirmal, Lakshmikanth Rajat Mohan, Zarrarahmed Khan","doi":"10.1109/iciptm54933.2022.9754195","DOIUrl":null,"url":null,"abstract":"In recent years, there have been significant advances in both technologies & tactics so in area of cyber security, with (ML) machine learning at the forefront of the transformation. It is the ability to obtain security event characteristics or findings from cyber security information and then develop a matching information model that will allow a security system to become autonomous and smart. The widespread proliferation and the usage of Web and Smartphone applications has increased the size of cyber world as a consequence. When a computerized assault takes too long to complete, the internet becomes vulnerable. Security measures may be improved by recognizing and reacting to cyber-attacks, thanks to cyber security techniques. Security measures that were previously used aren't any longer appropriate because scammers have learned how to evade them. It is getting more difficult to detect formerly unknown and unpredictable security breaches, which are growing more widespread. Cyber security is becoming more dependent on machine learning (ML) techniques. Machine learning algorithms' dependability remains a major challenge, given its continual advancement. It is possible to find malicious hackers in internet that are ready to exploit ML defects that have been made public. A thorough review of machine learning techniques safeguarding cyberspace against attacks is provided in this paper, which presents a literature review on Cyber security using machine learning methods, such as vulnerability scanning, spam filtering, or threat detection on desktop networks as well as smart phone networks. Among other things, this paper provides brief descriptions of each machine-learning technique and security info, essential machine-learning technology, and evaluation parameters for a classification method.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"36 1","pages":"95-100"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In recent years, there have been significant advances in both technologies & tactics so in area of cyber security, with (ML) machine learning at the forefront of the transformation. It is the ability to obtain security event characteristics or findings from cyber security information and then develop a matching information model that will allow a security system to become autonomous and smart. The widespread proliferation and the usage of Web and Smartphone applications has increased the size of cyber world as a consequence. When a computerized assault takes too long to complete, the internet becomes vulnerable. Security measures may be improved by recognizing and reacting to cyber-attacks, thanks to cyber security techniques. Security measures that were previously used aren't any longer appropriate because scammers have learned how to evade them. It is getting more difficult to detect formerly unknown and unpredictable security breaches, which are growing more widespread. Cyber security is becoming more dependent on machine learning (ML) techniques. Machine learning algorithms' dependability remains a major challenge, given its continual advancement. It is possible to find malicious hackers in internet that are ready to exploit ML defects that have been made public. A thorough review of machine learning techniques safeguarding cyberspace against attacks is provided in this paper, which presents a literature review on Cyber security using machine learning methods, such as vulnerability scanning, spam filtering, or threat detection on desktop networks as well as smart phone networks. Among other things, this paper provides brief descriptions of each machine-learning technique and security info, essential machine-learning technology, and evaluation parameters for a classification method.
提高网络安全质量的机器学习方法实证分析
近年来,网络安全领域的技术和战术都取得了重大进展,机器学习处于转型的最前沿。它是从网络安全信息中获取安全事件特征或发现,然后开发匹配的信息模型,从而使安全系统变得自治和智能的能力。网络和智能手机应用程序的广泛扩散和使用增加了网络世界的规模。当电脑攻击需要很长时间才能完成时,互联网就会变得脆弱。由于网络安全技术的发展,安全措施可以通过识别和应对网络攻击而得到改进。以前使用的安全措施不再适用,因为骗子已经学会了如何逃避这些措施。发现以前未知和不可预测的安全漏洞变得越来越困难,而这些漏洞正变得越来越普遍。网络安全越来越依赖于机器学习(ML)技术。鉴于机器学习算法的不断进步,其可靠性仍然是一个重大挑战。有可能在互联网上找到恶意黑客,他们准备利用已公开的ML缺陷。本文对保护网络空间免受攻击的机器学习技术进行了全面的回顾,并对使用机器学习方法的网络安全进行了文献综述,例如桌面网络和智能手机网络上的漏洞扫描、垃圾邮件过滤或威胁检测。除此之外,本文还简要描述了每种机器学习技术和安全信息,基本机器学习技术以及分类方法的评估参数。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信