Machine learning models for enhancing cyber security

被引:0
作者
Therasa, P. R. [1 ]
Shanmuganathan, M. [2 ]
Bapu, B. R. Tapas [3 ]
Sankarram, N. [4 ]
机构
[1] RMK Engn Coll, Dept Comp Sci & Engn, Chennai, India
[2] Panimalar Engn Coll, Dept Comp Sci & Engn, Chennai 600123, Tamil Nadu, India
[3] SA Engn Coll, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
[4] KGiSL Inst Technol, Dept Informat Technol, Coimbatore 641035, Tamil Nadu, India
关键词
cyberattack; security modelling; intrusion prevention; intelligence on cyber threats; cybersecurity; learning techniques; data science; and determination making; INTRUSION-DETECTION;
D O I
10.1504/IJESDF.2024.140742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because networks are having an ever-increasing impact on contemporary life, cybersecurity has become an increasingly essential area of research. Virus protection, firewalls, intrusion detection systems, and other related technologies are the primary focus of most cybersecurity strategies. These methods defend networks against assaults from both within and outside the organisation. The ever-increasing complexity of deep learning as well as machine learning-based technologies has been applied in the detection and prevention of possible threats. The objective of this research is to investigate and expand upon the applications of machine learning techniques within the context of the topic of cybersecurity. We offer accessible a multi-layered system that is built on machine learning with the intention of modelling cybersecurity. This will be our key area of focus as we work toward achieving our goal of guiding the application toward data-driven, intelligent decision-making for the aim of protecting systems from being attacked by cybercriminals.
引用
收藏
页码:590 / 601
页数:13
相关论文
共 29 条
[1]  
[Anonymous], 2019, Google Trends
[2]  
[Anonymous], 2011, P 9 AUSTR DAT MIN C
[3]   From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions [J].
Anwar S. ;
Zain J.M. ;
Zolkipli M.F. ;
Inayat Z. ;
Khan S. ;
Anthony B. ;
Chang V. .
Algorithms, 2017, 10 (02)
[4]   Representation Learning: A Review and New Perspectives [J].
Bengio, Yoshua ;
Courville, Aaron ;
Vincent, Pascal .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) :1798-1828
[5]  
Buecker A., 2010, Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
[6]  
Chernenko E., 2018, Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms
[7]  
Craigen D, 2014, TECHNOL INNOV MANAG, P13
[8]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[9]  
Fischer E.A., 2005, Creating a national framework for cybersecurity: An analysis of issues and options
[10]  
Fischer E. A., 2014, Cybersecurity Issues and Challenges: In Brief