Applications of Machine Learning in Cyber Security: A Review

被引:3
作者
Vourganas, Ioannis J. [1 ]
Michala, Anna Lito [1 ]
机构
[1] Netrity Ltd, Glasgow G2 1BP, Scotland
来源
JOURNAL OF CYBERSECURITY AND PRIVACY | 2024年 / 4卷 / 04期
基金
“创新英国”项目;
关键词
intrusion detection systems; dataset review; machine learning; ethical AI; INTRUSION DETECTION; FALSE POSITIVES; DETECTION SYSTEM; INTERNET; NEGATIVES; MODEL;
D O I
10.3390/jcp4040045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Machine Learning (ML) and Artificial Intelligence (AI) have been gaining ground in Cyber Security (CS) research in an attempt to counter increasingly sophisticated attacks. However, this paper poses the question of qualitative and quantitative data. This paper argues that scholarly research in this domain is severely impacted by the quality and quantity of available data. Datasets are disparate. There is no uniformity in (i) the dataset features, (ii) the methods of collection, or (iii) the preprocessing requirements to enable good-quality analyzed data that are suitable for automated decision-making. This review contributes to the existing literature by providing a single summary of the wider field in relation to AI, evaluating the most recent datasets, combining considerations of ethical AI, and posing a list of open research questions to guide future research endeavors. Thus, this paper contributes valuable insights to the cyber security field, fostering advancements for the application of AI/ML.
引用
收藏
页码:972 / 992
页数:21
相关论文
共 98 条
[1]   Spreading cybersecurity awareness via gamification: zero-day game [J].
Abu-Amara F. ;
Hosani R.A. ;
Tamimi H.A. ;
Hamdi B.A. .
International Journal of Information Technology, 2024, 16 (5) :2945-2953
[2]   Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning [J].
Abualghanam, Orieb ;
Alazzam, Hadeel ;
Elshqeirat, Basima ;
Qatawneh, Mohammad ;
Almaiah, Mohammed Amin .
ELECTRONICS, 2023, 12 (06)
[3]  
Adekunle T.S., 2024, J. Comput. Theor. Appl, V2, P169
[4]   Anomaly detection optimization using big data and deep learning to reduce false-positive [J].
Al Jallad, Khloud ;
Aljnidi, Mohamad ;
Desouki, Mohammad Said .
JOURNAL OF BIG DATA, 2020, 7 (01)
[5]   Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm [J].
Al-Shehari, Taher Ali ;
Rosaci, Domenico ;
Al-Razgan, Muna ;
Alfakih, Taha ;
Kadrie, Mohammed ;
Afzal, Hammad ;
Nawaz, Raheel .
IEEE ACCESS, 2024, 12 :34820-34834
[6]  
Alahmadi BA, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P2783
[7]   A Deep Learning Methodology for Predicting Cybersecurity Attacks on the Internet of Things [J].
Alkhudaydi, Omar Azib ;
Krichen, Moez ;
Alghamdi, Ans D. .
INFORMATION, 2023, 14 (10)
[8]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[9]  
[Anonymous], 2003, NIST SPECIAL PUBLICA, DOI DOI 10.6028/NIST.SP.800-50
[10]   Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution [J].
Azam, Naila ;
Michala, Anna Lito ;
Ansari, Shuja ;
Truong, Nguyen B. .
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, :3300-3305