Skip to main content

2024 | OriginalPaper | Buchkapitel

An Exploration of Machine Learning Approaches in the Field of Cybersecurity

verfasst von : Brajesh Kumar Khare, Imran Khan

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The extensive and growing utilization of the Internet and mobile apps has resulted in the enlargement of the online realm, rendering it more vulnerable to extended and automated cyber assaults. In response to this heightened vulnerability, cybersecurity techniques have been developed to strengthen security measures and improve the ability to detect and respond to cyberattacks. Due to the intelligence of cybercriminals in evading traditional security systems, the previously employed security measures have become inadequate. Conventional security systems struggle to effectively detect new and ever-changing security attacks that are previously unseen or have varying forms. ML methods are making substantial contributions to different aspects of cybersecurity, playing a pivotal role in numerous applications within the discipline. While ML systems have been successful so far, there are considerable obstacles in ensuring their trustworthiness. This paper’s main objective is to offer a thorough examination of the obstacles ML techniques encounter in safeguarding cyberspace from attacks. This is accomplished by examining the existing body of literature concerning ML techniques utilized in the field of cybersecurity. These techniques encompass areas such as intrusion detection, spam detection, and malware detection within computer and mobile networks. The document also provides succinct elucidations of each specific machine learning approach, indispensable machine learning tools, ML involvement in cybersecurity, and current state of ML for cybersecurity. Finally, the paper examines the barriers and challenges, as well as the anticipated path for the future of ML in the context of cybersecurity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhou X et al (2022) Carbon-economic inequality in global ICT trade. Iscience 25(12) Zhou X et al (2022) Carbon-economic inequality in global ICT trade. Iscience 25(12)
2.
Zurück zum Zitat Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: a machine learning perspective. CRC Press Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: a machine learning perspective. CRC Press
3.
Zurück zum Zitat Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Machine learning approaches in cyber security analytics. Springer, SingaporeCrossRef Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Machine learning approaches in cyber security analytics. Springer, SingaporeCrossRef
4.
Zurück zum Zitat Al-Turjman F, Zahmatkesh H, Shahroze R (2022) An overview of security and privacy in smart cities’ IoT communications. Trans Emerg Telecommun Technol 33(3):e3677CrossRef Al-Turjman F, Zahmatkesh H, Shahroze R (2022) An overview of security and privacy in smart cities’ IoT communications. Trans Emerg Telecommun Technol 33(3):e3677CrossRef
5.
Zurück zum Zitat Firdausi I, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE Firdausi I, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE
6.
Zurück zum Zitat Manjramkar MA, Jondhale KC (2023) Cyber security using machine learning techniques. In: International conference on applications of machine intelligence and data analytics (ICAMIDA 2022). Atlantis Press Manjramkar MA, Jondhale KC (2023) Cyber security using machine learning techniques. In: International conference on applications of machine intelligence and data analytics (ICAMIDA 2022). Atlantis Press
7.
Zurück zum Zitat Kaspersky M (2020) What is cyber security? Kaspersky M (2020) What is cyber security?
8.
Zurück zum Zitat Martínez Torres J, Comesaña CI, García-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern 10:2823–2836 Martínez Torres J, Comesaña CI, García-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern 10:2823–2836
9.
Zurück zum Zitat Spafford EH (1994) Computer viruses as artificial life. Artif Life 1(3):249–265CrossRef Spafford EH (1994) Computer viruses as artificial life. Artif Life 1(3):249–265CrossRef
10.
Zurück zum Zitat Ganapathi P (2020) A review of machine learning methods applied for handling zero-day attacks in the cloud environment. Handbook of research on machine and deep learning applications for cyber security, pp 364–387 Ganapathi P (2020) A review of machine learning methods applied for handling zero-day attacks in the cloud environment. Handbook of research on machine and deep learning applications for cyber security, pp 364–387
11.
Zurück zum Zitat Uma M, Padmavathi G (2013) A survey on various cyber-attacks and their classification. Int J Netw Secur 15(5):390–396 Uma M, Padmavathi G (2013) A survey on various cyber-attacks and their classification. Int J Netw Secur 15(5):390–396
12.
Zurück zum Zitat Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC Press Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC Press
13.
Zurück zum Zitat Apruzzese G et al (2018) On the effectiveness of machine and deep learning for cyber security. In: 2018 10th international conference on cyber-Conflict (CyCon). IEEE Apruzzese G et al (2018) On the effectiveness of machine and deep learning for cyber security. In: 2018 10th international conference on cyber-Conflict (CyCon). IEEE
14.
Zurück zum Zitat Fraley JB, Cannady J (2017) The promise of machine learning in cybersecurity. In: SoutheastCon 2017. IEEE Fraley JB, Cannady J (2017) The promise of machine learning in cybersecurity. In: SoutheastCon 2017. IEEE
15.
Zurück zum Zitat Kulkarni, AD, Brown III LL (2019) Phishing websites detection using machine learning Kulkarni, AD, Brown III LL (2019) Phishing websites detection using machine learning
16.
Zurück zum Zitat Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discovery 2(2):121–167 Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discovery 2(2):121–167
17.
Zurück zum Zitat Witten IH et al (2017) Practical machine learning tools and techniques. Data mining, 4th edn, Elsevier Publishers Witten IH et al (2017) Practical machine learning tools and techniques. Data mining, 4th edn, Elsevier Publishers
18.
Zurück zum Zitat Srikant R, Agrawal R (1996) Mining sequential patterns: generalizations and performance improvements. In: International conference on extending database technology. Springer, Berlin, Heidelberg Srikant R, Agrawal R (1996) Mining sequential patterns: generalizations and performance improvements. In: International conference on extending database technology. Springer, Berlin, Heidelberg
19.
Zurück zum Zitat Jain AK, Mao J, Moidin Mohiuddin K (1996) Artificial neural networks: a tutorial. Computer 29(3): 31–44 Jain AK, Mao J, Moidin Mohiuddin K (1996) Artificial neural networks: a tutorial. Computer 29(3): 31–44
20.
Zurück zum Zitat Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 Decision Tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 Decision Tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE
21.
Zurück zum Zitat Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall, Inc. Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall, Inc.
22.
Zurück zum Zitat Selvaraj, Soundarya. Applying of machine learning for spam classification. Diss. Instytut Telekomunikacji, 2019. Selvaraj, Soundarya. Applying of machine learning for spam classification. Diss. Instytut Telekomunikacji, 2019.
23.
Zurück zum Zitat Chandrasekar C, Priyatharsini P (2018) Classification techniques using spam filtering email. Int J Adv Res Comput Sci 9(2) Chandrasekar C, Priyatharsini P (2018) Classification techniques using spam filtering email. Int J Adv Res Comput Sci 9(2)
24.
Zurück zum Zitat Lee SM et al (2010) Spam detection using feature selection and parameters optimization. In: 2010 international conference on complex, intelligent and software intensive systems. IEEE Lee SM et al (2010) Spam detection using feature selection and parameters optimization. In: 2010 international conference on complex, intelligent and software intensive systems. IEEE
25.
Zurück zum Zitat Subramaniam T, Jalab HA, Taqa AY (2010) Overview of textual anti-spam filtering techniques. Int J Phys Sci 5(12):1869–1882 Subramaniam T, Jalab HA, Taqa AY (2010) Overview of textual anti-spam filtering techniques. Int J Phys Sci 5(12):1869–1882
26.
Zurück zum Zitat Kadir MFA et al (2022) Spam detection using machine learning based binary classifier. Indones J Electr Eng Comput Sci (IJEECS) 26(1):310–317 Kadir MFA et al (2022) Spam detection using machine learning based binary classifier. Indones J Electr Eng Comput Sci (IJEECS) 26(1):310–317
27.
Zurück zum Zitat Sharma S, Arora A (2013) Adaptive approach for spam detection. Int J Comput Sci Iss (IJCSI) 10(4):23 Sharma S, Arora A (2013) Adaptive approach for spam detection. Int J Comput Sci Iss (IJCSI) 10(4):23
28.
Zurück zum Zitat Rathi M, Pareek V (2013) Spam mail detection through data mining—a comparative performance analysis. Int J Mod Educ Comput Sci 5(12) Rathi M, Pareek V (2013) Spam mail detection through data mining—a comparative performance analysis. Int J Mod Educ Comput Sci 5(12)
29.
Zurück zum Zitat Saab SA, Mitri N, Awad M (2014) Ham or spam? A comparative study for some content-based classification algorithms for email filtering. In: MELECON 2014–2014 17th IEEE Mediterranean electrotechnical conference. IEEE Saab SA, Mitri N, Awad M (2014) Ham or spam? A comparative study for some content-based classification algorithms for email filtering. In: MELECON 2014–2014 17th IEEE Mediterranean electrotechnical conference. IEEE
30.
Zurück zum Zitat Zhang Y et al (2014) Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl-Based Syst 64:22–31 Zhang Y et al (2014) Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl-Based Syst 64:22–31
31.
Zurück zum Zitat Subba B, Biswas S, Karmakar S (2016) Enhancing performance of anomaly-based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE Subba B, Biswas S, Karmakar S (2016) Enhancing performance of anomaly-based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE
32.
Zurück zum Zitat Tiwari VN, Rathore S, Patidar K (2016) Enhanced method for intrusion detection over KDD cup 99 dataset. Int J Curr Trends Eng Technol 2(02) Tiwari VN, Rathore S, Patidar K (2016) Enhanced method for intrusion detection over KDD cup 99 dataset. Int J Curr Trends Eng Technol 2(02)
33.
Zurück zum Zitat Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(Suppl 1):1051–1058CrossRef Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(Suppl 1):1051–1058CrossRef
34.
Zurück zum Zitat Syarif AR, Gata W (2017) Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In: 2017 11th international conference on information & communication technology and system (ICTS). IEEE Syarif AR, Gata W (2017) Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In: 2017 11th international conference on information & communication technology and system (ICTS). IEEE
35.
Zurück zum Zitat Malik AJ, Khan FA (2018) A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput 21:667–680 Malik AJ, Khan FA (2018) A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput 21:667–680
36.
Zurück zum Zitat Bouzida Y, Cuppens F (2006) Neural networks vs. decision trees for intrusion detection. In: IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM), vol 28 Bouzida Y, Cuppens F (2006) Neural networks vs. decision trees for intrusion detection. In: IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM), vol 28
37.
Zurück zum Zitat Sarnovsky M, Paralic J (2020) Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12(2):203CrossRef Sarnovsky M, Paralic J (2020) Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12(2):203CrossRef
38.
Zurück zum Zitat Anderson B et al (2011) Graph-based malware detection using dynamic analysis. J Comput Virol 7:247–258 Anderson B et al (2011) Graph-based malware detection using dynamic analysis. J Comput Virol 7:247–258
39.
Zurück zum Zitat Santos I et al (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82 Santos I et al (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82
40.
Zurück zum Zitat Salehi Z, Sami A, Ghiasi M (2014) Using feature generation from API calls for malware detection. Comput Fraud Secur 2014(9):9–18CrossRef Salehi Z, Sami A, Ghiasi M (2014) Using feature generation from API calls for malware detection. Comput Fraud Secur 2014(9):9–18CrossRef
41.
Zurück zum Zitat Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Appl 9(5):205–216 Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Appl 9(5):205–216
42.
Zurück zum Zitat Yan P, Yan Z (2018) A survey on dynamic mobile malware detection. Software Qual J 26(3):891–919CrossRef Yan P, Yan Z (2018) A survey on dynamic mobile malware detection. Software Qual J 26(3):891–919CrossRef
43.
Zurück zum Zitat Ma Z et al (2020) Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:2002.03594 Ma Z et al (2020) Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:​2002.​03594
Metadaten
Titel
An Exploration of Machine Learning Approaches in the Field of Cybersecurity
verfasst von
Brajesh Kumar Khare
Imran Khan
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_24

Neuer Inhalt