CyMac: Diving Deep into the Application of Machine Learning Algorithms in Cyber Security

Abstract

Machine learning has emerged as a climatic technology in contemporary and prospective cyber threat intel systems, with numerous jurisdictions seamlessly integrating it into their operations. However, the current state of machine learning in cyber defence is still in its early stages, foreshadowing a noticeable unexplored research territory and practical implementation. This paper marks the initial endeavour to offer a comprehensive understanding of machine learning within the entire spectrum of cybersecurity jurisdictions, catering to potential end users with enthusiasm in this field of study. This paper aims to serve as a source of inspiration for significant advancements in ML within the cyber defence zone, laying the groundwork for the broader adoption of ML mitigations to safeguard present and heuristic systems.

Country : India

1 Bishwajit Das2 Nikita Yadav3 Deepa Chauhan4 Sanju Gupta

  1. Department of Computer Science & Engineering, Chhatrapati Shivaji Maharaj University, Navi Mumbai, India
  2. Department of Computer Science & Engineering, Chhatrapati Shivaji Maharaj University, Navi Mumbai, India
  3. Department of Computer Science & Engineering, Chhatrapati Shivaji Maharaj University, Navi Mumbai, India
  4. Department of Computer Science & Engineering, Chhatrapati Shivaji Maharaj University, Navi Mumbai, India

IRJIET, Volume 8, Issue 1, January 2024 pp. 74-80

doi.org/10.47001/IRJIET/2024.801010

References

  1. Nir Kshetri. 2021. Economics of Artificial Intelligence in Cybersecurity. IEEE IT Professional 23, 5(2021), 73–77.
  2. 2021. Darktrace Industrial Uses Machine Learning to Identify Cyber   Campaigns Targeting Critical Infrastructure.  https://www.darktrace.com/en/press/2017/204/
  3. Last line. 2020. Using AI to Detect and Contain Cyberthreats. Technical Report. https://www.lastline.com/wp-content/uploads/2020/01/Lastline_WP_AI_Done_Right_web.pdf
  4. Mohammad S. Jalali, Michael Siegel, and Stuart Madnick. 2019. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. Elsevier, The Journal of Strategic Information Systems 28, 1 (2019), 66–82.
  5. Ravi Vijayakumar, Mamoun Alazab, KP Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, and Sitalakshmi Venkatraman. 2019. Deep learning approach for the intelligent intrusion detection system. IEEE Access 7 (2019), 41525–41550.
  6. Camila Pontes, Manuela Souza, João Gondim, Matt Bishop, and Marcelo Marotta. 2021. A new method for OW-based network intrusion detection using the inverse Potts model. IEEE Transactions on Network and Service Management (2021).
  7. Chika Yinka-Banjo and Ogban-AsuquoUgot. 2020. A review of generative adversarial networks and their application in cybersecurity.
  8. Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, and Mirco Marchetti. 2018. On the Electiveness of Machine and Deep Learning for Cybersecurity. In Proc. IEEE International Conference on Cyber Conicts. 371–390.
  9. Daniel S Berman, Anna L Buczak, Jeffrey S Chavis, and Cherita L Corbett. 2019. A survey of deep learning methods for cyber security.
  10. Rakesh M. Verma, Victor Zeng, and HoutanFaridi. 2019. Data quality for security challenges: Case studies of phishing, malware, and intrusion detection datasets. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2605–2607.
  11. Yann Le Cun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436–444.
  12. Kasun Amarasinghe, Kevin Kenney, and Milos Manic. 2018. Toward explainable deep neural network-based anomaly detection. In Proc.
  13. Nisreen Alzahrani and Daniyal Alghazzawi. 2019. A review on Android ransomware detection using deep learning techniques. In Proc. ACM Int. Conf. Manag. Digit. Eco Syst. 330–335.
  14. Gianluca Bontempi, Souhaib Ben Taieb, and Yann-Aël Le Borgne. 2012. Machine learning strategies for time series forecasting. In European business intelligence summer school. 62–77.
  15. Petar Radanliev, David De Roure, Rob Walton, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, Peter Burnap, Eirini Anthi, et al. 2020.  Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge. SN Applied Sciences 2, 11 (2020), 1–8.
  16. Emilie Bout, Valeria Loscri, and Antoine Gallais. 2021. How Machine Learning changes the nature of cyberattacks on IoT networks: A survey. IEEE Commun. Surv. Tut. (2021).
  17. Joseph Gardiner and Shishir Nagaraja. 2016. On the security of machine learning in malware c&c detection: A survey. ACM Computing Surveys (CSUR) 49, 3 (2016), 59.
  18. Daniele Ucci, Leonardo Aniello, and Roberto Baldoni. 2019. Survey of machine learning techniques for malware analysis. Computers & Security 81 (2019), 123–147.
  19. Tushaar Gangavarapu, CD Jaidhar, and Bhabesh Chanduka. 2020. Applicability of machine learning in spam and phishing email filtering: review and approaches. Artificial Intelligence Review (2020), 1–63.
  20. Asif Karim, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, and Mamoun Alazab. 2019. A comprehensive survey for intelligent spam email detection. IEEE Access 7 (2019), 168261–168295.