Applications of Machine Learning in Cyber Security

AUTHORS

N. Thirupathi Rao,Dept. of Computer Science and EngineeringVignan’s Institute of Information Technology (A), Visakhapatnam 530049, AP, India
Debnath Bhattacharyya,Dept. of Computer Science and EngineeringVignan’s Institute of Information Technology (A), Visakhapatnam 530049, AP, India

ABSTRACT

Machine learning is one of the latest trends models and methods that can be implemented and the users can get good results. The growth of this area was developing day to day by almost all areas of applications and research. The other important area to be considered was the cyber security. Most of the common people also being trapped by these technologies and the people are losing their valuable data in some cases and in some other cases the people or losing their valuable money also. In some other cases, the people are losing their lives due to the sharing of their personal data to the public domain. Hence, people need to think of these problems in a different manner and also to solve these technical problems by using these advanced technologies. In the current article, some of the cyber security issues and threats that were being occurring in these days were highlighted and how the utilization of these machine learning techniques will be used to identify such threats and can be avoided or can be protected from these sorts of attacks.

 

KEYWORDS

Machine learning, Algorithms, Attacks, Cyber security, Shells, Networks, Components, Hubs, Switches, Routers, Servers

REFERENCES

[1]    RAJASIMHA KOPPULA, “Applications of machine Learning in cyber security you need to know about,” apiumhub, in technology industry trends, (2018)
[2]    Expert System, “What is machine learning? A definition,” https://www.expertsystem.com/machine-learning-definition, (2017)
[3]    Das, Rishabh, Morris, and Thomas, “Machine learning and cyber security,” International Conference on Computer, Electrical & Communication Engineering (ICCECE), USA, pp.1-7, (2017) DOI: 10.1109/ICCECE.2017.8526232(CrossRef)(Google Scholar)
[4]    Apruzzese Giovanni, Colajanni Michele, Ferretti Luca, Guido Alessandro, and Marchetti Mirco, “On the effectiveness of machine and deep learning for cyber security,” 10th International Conference on Cyber Conflict (CyCon), pp.45-56, (2018) DOI: 10.23919/CYCON.2018.8405026(CrossRef)(Google Scholar)
[5]    James B. Fraley and James Cannady, “The promise of machine learning in cyber security,” Southeast Con 2017, Charlotte, NC, USA, pp.55-62, (2017) DOI: 10.1109/SECON.2017.7925283(CrossRef)(Google Scholar)
[6]    Philip K. Chan and Richard P. Lippmann, “Machine learning for computer security”, Journal of Machine Learning Research, vol.7, pp.2669-2672, (2006)
[7]    Chandra, Yogesh., “Application of machine learning in cyber security”, National Conference on Digitization at Delhi, (2016)
[8]    Amrita Mitra, “What is watering hole attack?” The Security Buddy, March 9, (2017)
[9]    Silver Moon, “What are web shells - Tutorial,” BinaryTides, Coding, Software, Tech and Reviews, (2019)
[10]  Anirudh Bharadwaj, “How machine learning can help counter spear phishing attacks,” Dles Technologies, August, (2018)

CITATION

  • APA:
    Rao,N.T.& Bhattacharyya,D.(2019). Applications of Machine Learning in Cyber Security. International Journal of Advanced Research in Computer and Information Security, 3(1), 1-8. 10.21742/IJACIS.2019.3.1.01
  • Harvard:
    Rao,N.T., Bhattacharyya,D.(2019). "Applications of Machine Learning in Cyber Security". International Journal of Advanced Research in Computer and Information Security, 3(1), pp.1-8. doi:10.21742/IJACIS.2019.3.1.01
  • IEEE:
    [1] N.T.Rao, D.Bhattacharyya, "Applications of Machine Learning in Cyber Security". International Journal of Advanced Research in Computer and Information Security, vol.3, no.1, pp.1-8, Dec. 2019
  • MLA:
    Rao N. Thirupathi and Bhattacharyya Debnath. "Applications of Machine Learning in Cyber Security". International Journal of Advanced Research in Computer and Information Security, vol.3, no.1, Dec. 2019, pp.1-8, doi:10.21742/IJACIS.2019.3.1.01

ISSUE INFO

  • Volume 3, No. 1, 2019
  • ISSN(p):2208-1658
  • ISSN(e):2208-1666
  • Published:Dec. 2019

DOWNLOAD