2020
DOI: 10.4018/978-1-5225-9611-0.ch003
|View full text |Cite
|
Sign up to set email alerts
|

Review on Machine and Deep Learning Applications for Cyber Security

Abstract: In today's world, everyone is generating a large amount of data on their own. With this amount of data generation, there is a change of security compromise of our data. This leads us to extend the security needs beyond the traditional approach which emerges the field of cyber security. Cyber security's core functionality is to protect all types of information, which includes hardware and software from cyber threats. The number of threats and attacks is increasing each year with a high difference between them. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…There are other types of attacks and threats such as SQL injection attack, drive-by attack, password attack, a man in the middle, authentication attacks, wrapping attacks, watering hole, and webshell [65,109]. However, we have just considered intrusion detection (ID), malware detection, and spam detection in this review article.…”
Section: A Basics Of Attacks and Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are other types of attacks and threats such as SQL injection attack, drive-by attack, password attack, a man in the middle, authentication attacks, wrapping attacks, watering hole, and webshell [65,109]. However, we have just considered intrusion detection (ID), malware detection, and spam detection in this review article.…”
Section: A Basics Of Attacks and Threatsmentioning
confidence: 99%
“…On the defence side, ML models are playing a vital role to provide robust and smarter techniques to improve the performance and early detection of attacks to decrease the impact and damage that occurred [63,64]. Machine learning techniques are combined to enhance the accuracy of correct and early classification of cyberattacks [65]. However, most of the studies are performed with an inadequate dataset.…”
Section: Introductionmentioning
confidence: 99%
“…They exploit the vulnerabilities existing in the victim's devices and silently enter their network, making them more dangerous. In the recent past, progressively more file-less attacks have been reported [10].…”
Section: Introductionmentioning
confidence: 99%