2019
DOI: 10.1002/widm.1306
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning in cybersecurity: A review

Abstract: Machine learning technology has become mainstream in a large number of domains, and cybersecurity applications of machine learning techniques are plenty. Examples include malware analysis, especially for zero‐day malware detection, threat analysis, anomaly based intrusion detection of prevalent attacks on critical infrastructures, and many others. Due to the ineffectiveness of signature‐based methods in detecting zero day attacks or even slight variants of known attacks, machine learning‐based detection is bei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 103 publications
(55 citation statements)
references
References 48 publications
0
53
0
2
Order By: Relevance
“…This research study the effectiveness Bi-directional recurrent neural network( BRNN) for intrusion detection which has provided promising results compared to some literature work. The full KDD Cup'99-intrusion detection dataset [5,32] were used to evaluate the algorithm.…”
Section: International Journal Of Advanced Engineering Research and Science (Ijaers)mentioning
confidence: 99%
“…This research study the effectiveness Bi-directional recurrent neural network( BRNN) for intrusion detection which has provided promising results compared to some literature work. The full KDD Cup'99-intrusion detection dataset [5,32] were used to evaluate the algorithm.…”
Section: International Journal Of Advanced Engineering Research and Science (Ijaers)mentioning
confidence: 99%
“…According to [64], despite the fact that the awareness of cyber-threats to building operations among FM professionals is high, there is no adequate standardization of the role specific responsibilities with regards to the mitigation of concerns. [65] present the use of machine learning based applications for the detection of cyber-attacks, noting that the manipulation of such tools is a major growing concern.…”
Section: Cyber Security and Data Privacymentioning
confidence: 99%
“…In [ 4 ], the study offers a scientific classification of some dangers of the existing IoT security, and provides a guide for novel and energizing research difficulties in applying ML and SDN (Software-Defined Network) ideas to address IoT security concerns. In [ 5 ], the authors reviewed the applications of ML in cybersecurity. There has also been a debate on the risks of utilizing cyber attacks as training and testing data for classification.…”
Section: Related Workmentioning
confidence: 99%