{"title":"利用机器学习检测网络威胁","authors":"Prakriti Prakriti","doi":"10.55041/ijsrem36799","DOIUrl":null,"url":null,"abstract":"As our world becomes more and more dependent on cyberspace in all fields, the number of cyber threats, their frequency and complexity have risen with an alarming rate. There are many forms of illegal activities committed over the internet, and together they form cyber-threats; from malware to phishing attacks, APT (advanced persistent threats), ransomware etc. Traditional security sits interaction of these threats is still limited compared to evolving nature, and hardly mitigates zero day attacks. As a result, Machine learning (ML) has become an essential indeed much-needed technology to empower Cyber threat detection and response. This paper investigates the increase in cyber threats as well as how cybersecurity techniques are perpetually enforced, while analysing methodology used by hackers. Here, we investigate a few of the bleeding-edge ML techniques being applied to detect and fight cyber threats from deep learning models like Convolutional Neural Networks (CNNs), Recurrent Neural Network, ensemble learning methods such as Random Forest and Support Vector Machine (SVM). This comprehensive overview highlights the effectiveness of these ML techniques in identifying and mitigating cyber threats, emphasizing the need for continuous innovation to stay ahead of increasingly sophisticated cybercriminal activities. KEYWORDS: Cyber Threat; Cybercrime; Machine Learning Application; Malware; Phishing; Ransomware; Spam;","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"21 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Threat Detection Using Machine Learning\",\"authors\":\"Prakriti Prakriti\",\"doi\":\"10.55041/ijsrem36799\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As our world becomes more and more dependent on cyberspace in all fields, the number of cyber threats, their frequency and complexity have risen with an alarming rate. There are many forms of illegal activities committed over the internet, and together they form cyber-threats; from malware to phishing attacks, APT (advanced persistent threats), ransomware etc. Traditional security sits interaction of these threats is still limited compared to evolving nature, and hardly mitigates zero day attacks. As a result, Machine learning (ML) has become an essential indeed much-needed technology to empower Cyber threat detection and response. This paper investigates the increase in cyber threats as well as how cybersecurity techniques are perpetually enforced, while analysing methodology used by hackers. Here, we investigate a few of the bleeding-edge ML techniques being applied to detect and fight cyber threats from deep learning models like Convolutional Neural Networks (CNNs), Recurrent Neural Network, ensemble learning methods such as Random Forest and Support Vector Machine (SVM). This comprehensive overview highlights the effectiveness of these ML techniques in identifying and mitigating cyber threats, emphasizing the need for continuous innovation to stay ahead of increasingly sophisticated cybercriminal activities. KEYWORDS: Cyber Threat; Cybercrime; Machine Learning Application; Malware; Phishing; Ransomware; Spam;\",\"PeriodicalId\":504501,\"journal\":{\"name\":\"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT\",\"volume\":\"21 9\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55041/ijsrem36799\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55041/ijsrem36799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
随着我们的世界在各个领域越来越依赖网络空间,网络威胁的数量、频率和复杂性也以惊人的速度上升。通过互联网实施的非法活动形式多样,它们共同构成了网络威胁;从恶意软件到网络钓鱼攻击、APT(高级持续性威胁)、勒索软件等。与不断发展的性质相比,传统的安全解决方案对这些威胁的交互仍然有限,很难缓解零日攻击。因此,机器学习(ML)已成为增强网络威胁检测和响应能力的一项必不可少且亟需的技术。本文在分析黑客使用的方法的同时,还调查了网络威胁的增加情况以及网络安全技术是如何被不断执行的。在这里,我们研究了一些用于检测和应对网络威胁的前沿 ML 技术,包括卷积神经网络(CNN)、循环神经网络等深度学习模型,以及随机森林和支持向量机(SVM)等集合学习方法。本综述重点介绍了这些 ML 技术在识别和减轻网络威胁方面的有效性,强调了不断创新以应对日益复杂的网络犯罪活动的必要性。关键词: 网络威胁;网络犯罪;机器学习应用;恶意软件;网络钓鱼;勒索软件;垃圾邮件;
As our world becomes more and more dependent on cyberspace in all fields, the number of cyber threats, their frequency and complexity have risen with an alarming rate. There are many forms of illegal activities committed over the internet, and together they form cyber-threats; from malware to phishing attacks, APT (advanced persistent threats), ransomware etc. Traditional security sits interaction of these threats is still limited compared to evolving nature, and hardly mitigates zero day attacks. As a result, Machine learning (ML) has become an essential indeed much-needed technology to empower Cyber threat detection and response. This paper investigates the increase in cyber threats as well as how cybersecurity techniques are perpetually enforced, while analysing methodology used by hackers. Here, we investigate a few of the bleeding-edge ML techniques being applied to detect and fight cyber threats from deep learning models like Convolutional Neural Networks (CNNs), Recurrent Neural Network, ensemble learning methods such as Random Forest and Support Vector Machine (SVM). This comprehensive overview highlights the effectiveness of these ML techniques in identifying and mitigating cyber threats, emphasizing the need for continuous innovation to stay ahead of increasingly sophisticated cybercriminal activities. KEYWORDS: Cyber Threat; Cybercrime; Machine Learning Application; Malware; Phishing; Ransomware; Spam;