Downloads: 4 | Views: 125 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper | Computer Science & Engineering | India | Volume 13 Issue 5, May 2024 | Popularity: 5.7 / 10
A Study: Use of Machine Learning for Cyber Security
Nidhi Kataria Chawla, Monika Gaur
Abstract: Machine learning is becoming prevalent in a variety of sectors, and machine learning algorithms are used in a variety of cyber secu-rity applications. Malware analysis, including zero - day malware detecting, risk evaluation, anomaly - based intrusion detection of common threats on critical systems, and other examples are just a few. Because signature - based methods are ineffective at detect-ing zero - day attacks or even slight modifications to existing attacks, researchers are employing machine learning (ML) - based identification in numerous security protocols. In this overview, we look at how machine learning is employed in several aspects of cyber - security. We also show how adversarial assaults on machine learning models can be used to change the data used to train and test models, rendering them useless.
Keywords: Cyber security, machine learning, intrusion detection, malware detection
Edition: Volume 13 Issue 5, May 2024
Pages: 723 - 730
DOI: https://www.doi.org/10.21275/SR24509101002
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera