Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation

被引:0
作者
Puthal, Deepak [1 ,2 ]
Mohanty, Saraju P. [3 ]
Mishra, Amit Kumar [4 ,5 ]
Yeun, Chan Yeob [1 ,2 ]
Damiani, Ernesto [1 ,2 ,6 ]
机构
[1] Khalifa Univ, Ctr C2PS, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept EECS, Abu Dhabi, U Arab Emirates
[3] Univ North Texas, Dept Comp Sci & Engn, Denton, TX USA
[4] Univ Cape Town, Dept Elect Engn, Cape Town, South Africa
[5] Univ West, Dept Engn Sci, Trollhattan, Sweden
[6] Univ Milan, Dept Comp Sci, Milan, Italy
来源
2023 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI | 2023年
关键词
Machine Learning; Logical Reasoning; cyber security; Synergy of ML and LR; Synergy of ML and LR for cyber security;
D O I
10.1109/ISVLSI59464.2023.10238483
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of machine learning (ML) and logical reasoning (LR) in cyber security is an emerging field that shows great potential for improving the efficiency and effectiveness of security systems. While ML can detect anomalies and patterns in large amounts of data, LR can provide a higher-level understanding of threats and enable better decision-making. This paper explores the future of ML and LR in cyber security and highlights how the integration of these two approaches can lead to more robust security systems. We discuss several use cases that demonstrate the effectiveness of the integrated approach, such as threat detection and response, vulnerability assessment, and security policy enforcement. Finally, we identify several research directions that will help advance the field, including the development of more explainable ML models and the integration of human-in-the-loop approaches.
引用
收藏
页码:85 / 90
页数:6
相关论文
共 20 条
  • [1] Analogical reasoning and cyber security
    Betz, David J.
    Stevens, Tim
    [J]. SECURITY DIALOGUE, 2013, 44 (02) : 147 - 164
  • [2] Das R., 2017, 2017 INT C COMP EL C, P1
  • [3] A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning
    El Kamel, Nadiya
    Eddabbah, Mohamed
    Lmoumen, Youssef
    Touahni, Raja
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [4] A survey of emerging threats in cybersecurity
    Jang-Jaccard, Julian
    Nepal, Surya
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (05) : 973 - 993
  • [5] Kandefer M., 2007, P MSS 2007 NAT S SEN
  • [6] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    [J]. COMPUTER NETWORKS, 2021, 188
  • [7] Kotsiantis SB, 2006, ARTIF INTELL REV, V26, P159, DOI 10.1007/S10462-007-9052-3
  • [8] Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
    Lee, In
    [J]. FUTURE INTERNET, 2020, 12 (09)
  • [9] Luo Z, 1994, Computation and reasoning, V49
  • [10] Application of deep learning to cybersecurity: A survey
    Mandavifar, Samaneh
    Ghorbani, Ali A.
    [J]. NEUROCOMPUTING, 2019, 347 : 149 - 176