A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions

被引:19
|
作者
Ozkan-Okay, Merve [1 ]
Akin, Erdal [2 ,3 ,4 ]
Aslan, Omer [5 ]
Kosunalp, Selahattin [6 ]
Iliev, Teodor [7 ]
Stoyanov, Ivaylo [8 ]
Beloev, Ivan [9 ]
机构
[1] Ankara Univ, Dept Comp Engn, TR-06100 Golbasi, Ankara, Turkiye
[2] Bitlis Eren Univ, Dept Comp Engn, TR-13100 Merkez, Bitlis, Turkiye
[3] Malmo Univ, Dept Comp Sci & Media Technol, Fac Engn, S-20506 Malmo, Sweden
[4] Malmo Univ, Internet Things & People Ctr, S-20506 Malmo, Sweden
[5] Bandirma Onyedi Eylul Univ, Dept Software Engn, TR-10250 Bandirma, Balikesir, Turkiye
[6] Bandirma Onyedi Eylul Univ, Gonen Vocat Sch, Dept Comp Technol, TR-10250 Bandirma, Balikesir, Turkiye
[7] Univ Ruse, Dept Telecommun, Ruse 7017, Bulgaria
[8] Univ Ruse, Dept Elect Power Engn, Ruse 7017, Bulgaria
[9] Univ Ruse, Dept Transport, Ruse 7017, Bulgaria
关键词
Cyberattacks and solutions; deep learning; machine learning; reinforcement learning; AI tools; REINFORCEMENT; INTERNET; CLASSIFICATION; ATTACKS;
D O I
10.1109/ACCESS.2024.3355547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause significant harm to individuals, organizations, and even countries. Machine learning algorithms use statistical methods to identify patterns and anomalies in large datasets, enabling security analysts to detect previously unknown threats. Deep learning, a subfield of ML, has shown great potential in improving the accuracy and efficiency of cybersecurity systems, particularly in image and speech recognition. On the other hand, RL is again a subfield of machine learning that trains algorithms to learn through trial and error, making it particularly effective in dynamic environments. We also evaluated the usage of ChatGPT-like AI tools in cyber-related problem domains on both sides, positive and negative. This article provides an overview of how ML, DL, and RL are applied in cybersecurity, including their usage in malware detection, intrusion detection, vulnerability assessment, and other areas. The paper also specifies several research questions to provide a more comprehensive framework to investigate the efficiency of AI and ML models in the cybersecurity domain. The state-of-the-art studies using ML, DL, and RL models are evaluated in each Section based on the main idea, techniques, and important findings. It also discusses these techniques' challenges and limitations, including data quality, interpretability, and adversarial attacks. Overall, the use of ML, DL, and RL in cybersecurity holds great promise for improving the effectiveness of security systems and enhancing our ability to protect against cyberattacks. Therefore, it is essential to continue developing and refining these techniques to address the ever-evolving nature of cyber threats. Besides, some promising solutions that rely on machine learning, deep learning, and reinforcement learning are susceptible to adversarial attacks, underscoring the importance of factoring in this vulnerability when devising countermeasures against sophisticated cyber threats. We also concluded that ChatGPT can be a valuable tool for cybersecurity, but it should be noted that ChatGPT-like tools can also be manipulated to threaten the integrity, confidentiality, and availability of data.
引用
收藏
页码:12229 / 12256
页数:28
相关论文
共 50 条
  • [1] Survey on applications of deep learning and machine learning techniques for cyber security
    Alghamdi M.I.
    Alghamdi, Mohammed I. (mialmushilah@bu.edu.sa), 2020, International Association of Online Engineering (14): : 210 - 224
  • [2] A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
    Shaukat, Kamran
    Luo, Suhuai
    Varadharajan, Vijay
    Hameed, Ibrahim A.
    Xu, Min
    IEEE ACCESS, 2020, 8 : 222310 - 222354
  • [3] Cyber security meets artificial intelligence: a survey
    Jian-hua Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1462 - 1474
  • [4] Cyber security meets artificial intelligence: a survey
    Li, Jian-hua
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (12) : 1462 - 1474
  • [5] A Comprehensive Survey of Artificial Intelligence and Machine Learning Application in Healthcare
    Vishwanatth, Kannan
    Satish, Savitha
    Enagandula, Prasad
    Khade, Anindita A.
    Pratibh
    Mirza, Zainab
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (06) : 1425 - 1431
  • [6] Providing Cyber Security using Artificial Intelligence - A survey
    Sagar, B. S.
    Niranjan, S.
    Kashyap, Nithin
    Sachin, D. N.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 717 - 720
  • [7] Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions
    Tlili, Fadhila
    Ayed, Samiha
    Fourati, Lamia Chaari
    INTERNET OF THINGS, 2024, 27
  • [8] Artificial intelligence for parking forecasting: an extensive survey of machine learning techniques
    Cao, Rong
    Choudhury, Farhana
    Winter, Stephan
    Wang, David Z. W.
    TRANSPORTMETRICA A-TRANSPORT SCIENCE, 2024,
  • [9] Assembling a Cyber Range to Evaluate Artificial Intelligence/Machine Learning (AI/ML) Security Tools
    Nichols, Jeffrey
    Spakes, Kevin
    Watson, Cory
    Bridges, Robert
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 240 - 248
  • [10] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
    Pour, Morteza Safaei
    Naderb, Christelle
    Friday, Kurt
    Bou-Harb, Elias
    COMPUTERS & SECURITY, 2023, 128