Skip to main content
Top

2024 | OriginalPaper | Chapter

An Exploration of Machine Learning Approaches in the Field of Cybersecurity

Authors : Brajesh Kumar Khare, Imran Khan

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The extensive and growing utilization of the Internet and mobile apps has resulted in the enlargement of the online realm, rendering it more vulnerable to extended and automated cyber assaults. In response to this heightened vulnerability, cybersecurity techniques have been developed to strengthen security measures and improve the ability to detect and respond to cyberattacks. Due to the intelligence of cybercriminals in evading traditional security systems, the previously employed security measures have become inadequate. Conventional security systems struggle to effectively detect new and ever-changing security attacks that are previously unseen or have varying forms. ML methods are making substantial contributions to different aspects of cybersecurity, playing a pivotal role in numerous applications within the discipline. While ML systems have been successful so far, there are considerable obstacles in ensuring their trustworthiness. This paper’s main objective is to offer a thorough examination of the obstacles ML techniques encounter in safeguarding cyberspace from attacks. This is accomplished by examining the existing body of literature concerning ML techniques utilized in the field of cybersecurity. These techniques encompass areas such as intrusion detection, spam detection, and malware detection within computer and mobile networks. The document also provides succinct elucidations of each specific machine learning approach, indispensable machine learning tools, ML involvement in cybersecurity, and current state of ML for cybersecurity. Finally, the paper examines the barriers and challenges, as well as the anticipated path for the future of ML in the context of cybersecurity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhou X et al (2022) Carbon-economic inequality in global ICT trade. Iscience 25(12) Zhou X et al (2022) Carbon-economic inequality in global ICT trade. Iscience 25(12)
2.
go back to reference Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: a machine learning perspective. CRC Press Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: a machine learning perspective. CRC Press
3.
go back to reference Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Machine learning approaches in cyber security analytics. Springer, SingaporeCrossRef Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Machine learning approaches in cyber security analytics. Springer, SingaporeCrossRef
4.
go back to reference Al-Turjman F, Zahmatkesh H, Shahroze R (2022) An overview of security and privacy in smart cities’ IoT communications. Trans Emerg Telecommun Technol 33(3):e3677CrossRef Al-Turjman F, Zahmatkesh H, Shahroze R (2022) An overview of security and privacy in smart cities’ IoT communications. Trans Emerg Telecommun Technol 33(3):e3677CrossRef
5.
go back to reference Firdausi I, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE Firdausi I, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE
6.
go back to reference Manjramkar MA, Jondhale KC (2023) Cyber security using machine learning techniques. In: International conference on applications of machine intelligence and data analytics (ICAMIDA 2022). Atlantis Press Manjramkar MA, Jondhale KC (2023) Cyber security using machine learning techniques. In: International conference on applications of machine intelligence and data analytics (ICAMIDA 2022). Atlantis Press
7.
8.
go back to reference Martínez Torres J, Comesaña CI, García-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern 10:2823–2836 Martínez Torres J, Comesaña CI, García-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybern 10:2823–2836
9.
go back to reference Spafford EH (1994) Computer viruses as artificial life. Artif Life 1(3):249–265CrossRef Spafford EH (1994) Computer viruses as artificial life. Artif Life 1(3):249–265CrossRef
10.
go back to reference Ganapathi P (2020) A review of machine learning methods applied for handling zero-day attacks in the cloud environment. Handbook of research on machine and deep learning applications for cyber security, pp 364–387 Ganapathi P (2020) A review of machine learning methods applied for handling zero-day attacks in the cloud environment. Handbook of research on machine and deep learning applications for cyber security, pp 364–387
11.
go back to reference Uma M, Padmavathi G (2013) A survey on various cyber-attacks and their classification. Int J Netw Secur 15(5):390–396 Uma M, Padmavathi G (2013) A survey on various cyber-attacks and their classification. Int J Netw Secur 15(5):390–396
12.
go back to reference Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC Press Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC Press
13.
go back to reference Apruzzese G et al (2018) On the effectiveness of machine and deep learning for cyber security. In: 2018 10th international conference on cyber-Conflict (CyCon). IEEE Apruzzese G et al (2018) On the effectiveness of machine and deep learning for cyber security. In: 2018 10th international conference on cyber-Conflict (CyCon). IEEE
14.
go back to reference Fraley JB, Cannady J (2017) The promise of machine learning in cybersecurity. In: SoutheastCon 2017. IEEE Fraley JB, Cannady J (2017) The promise of machine learning in cybersecurity. In: SoutheastCon 2017. IEEE
15.
go back to reference Kulkarni, AD, Brown III LL (2019) Phishing websites detection using machine learning Kulkarni, AD, Brown III LL (2019) Phishing websites detection using machine learning
16.
go back to reference Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discovery 2(2):121–167 Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discovery 2(2):121–167
17.
go back to reference Witten IH et al (2017) Practical machine learning tools and techniques. Data mining, 4th edn, Elsevier Publishers Witten IH et al (2017) Practical machine learning tools and techniques. Data mining, 4th edn, Elsevier Publishers
18.
go back to reference Srikant R, Agrawal R (1996) Mining sequential patterns: generalizations and performance improvements. In: International conference on extending database technology. Springer, Berlin, Heidelberg Srikant R, Agrawal R (1996) Mining sequential patterns: generalizations and performance improvements. In: International conference on extending database technology. Springer, Berlin, Heidelberg
19.
go back to reference Jain AK, Mao J, Moidin Mohiuddin K (1996) Artificial neural networks: a tutorial. Computer 29(3): 31–44 Jain AK, Mao J, Moidin Mohiuddin K (1996) Artificial neural networks: a tutorial. Computer 29(3): 31–44
20.
go back to reference Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 Decision Tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 Decision Tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE
21.
go back to reference Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall, Inc. Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall, Inc.
22.
go back to reference Selvaraj, Soundarya. Applying of machine learning for spam classification. Diss. Instytut Telekomunikacji, 2019. Selvaraj, Soundarya. Applying of machine learning for spam classification. Diss. Instytut Telekomunikacji, 2019.
23.
go back to reference Chandrasekar C, Priyatharsini P (2018) Classification techniques using spam filtering email. Int J Adv Res Comput Sci 9(2) Chandrasekar C, Priyatharsini P (2018) Classification techniques using spam filtering email. Int J Adv Res Comput Sci 9(2)
24.
go back to reference Lee SM et al (2010) Spam detection using feature selection and parameters optimization. In: 2010 international conference on complex, intelligent and software intensive systems. IEEE Lee SM et al (2010) Spam detection using feature selection and parameters optimization. In: 2010 international conference on complex, intelligent and software intensive systems. IEEE
25.
go back to reference Subramaniam T, Jalab HA, Taqa AY (2010) Overview of textual anti-spam filtering techniques. Int J Phys Sci 5(12):1869–1882 Subramaniam T, Jalab HA, Taqa AY (2010) Overview of textual anti-spam filtering techniques. Int J Phys Sci 5(12):1869–1882
26.
go back to reference Kadir MFA et al (2022) Spam detection using machine learning based binary classifier. Indones J Electr Eng Comput Sci (IJEECS) 26(1):310–317 Kadir MFA et al (2022) Spam detection using machine learning based binary classifier. Indones J Electr Eng Comput Sci (IJEECS) 26(1):310–317
27.
go back to reference Sharma S, Arora A (2013) Adaptive approach for spam detection. Int J Comput Sci Iss (IJCSI) 10(4):23 Sharma S, Arora A (2013) Adaptive approach for spam detection. Int J Comput Sci Iss (IJCSI) 10(4):23
28.
go back to reference Rathi M, Pareek V (2013) Spam mail detection through data mining—a comparative performance analysis. Int J Mod Educ Comput Sci 5(12) Rathi M, Pareek V (2013) Spam mail detection through data mining—a comparative performance analysis. Int J Mod Educ Comput Sci 5(12)
29.
go back to reference Saab SA, Mitri N, Awad M (2014) Ham or spam? A comparative study for some content-based classification algorithms for email filtering. In: MELECON 2014–2014 17th IEEE Mediterranean electrotechnical conference. IEEE Saab SA, Mitri N, Awad M (2014) Ham or spam? A comparative study for some content-based classification algorithms for email filtering. In: MELECON 2014–2014 17th IEEE Mediterranean electrotechnical conference. IEEE
30.
go back to reference Zhang Y et al (2014) Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl-Based Syst 64:22–31 Zhang Y et al (2014) Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl-Based Syst 64:22–31
31.
go back to reference Subba B, Biswas S, Karmakar S (2016) Enhancing performance of anomaly-based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE Subba B, Biswas S, Karmakar S (2016) Enhancing performance of anomaly-based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE
32.
go back to reference Tiwari VN, Rathore S, Patidar K (2016) Enhanced method for intrusion detection over KDD cup 99 dataset. Int J Curr Trends Eng Technol 2(02) Tiwari VN, Rathore S, Patidar K (2016) Enhanced method for intrusion detection over KDD cup 99 dataset. Int J Curr Trends Eng Technol 2(02)
33.
go back to reference Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(Suppl 1):1051–1058CrossRef Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(Suppl 1):1051–1058CrossRef
34.
go back to reference Syarif AR, Gata W (2017) Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In: 2017 11th international conference on information & communication technology and system (ICTS). IEEE Syarif AR, Gata W (2017) Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In: 2017 11th international conference on information & communication technology and system (ICTS). IEEE
35.
go back to reference Malik AJ, Khan FA (2018) A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput 21:667–680 Malik AJ, Khan FA (2018) A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput 21:667–680
36.
go back to reference Bouzida Y, Cuppens F (2006) Neural networks vs. decision trees for intrusion detection. In: IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM), vol 28 Bouzida Y, Cuppens F (2006) Neural networks vs. decision trees for intrusion detection. In: IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM), vol 28
37.
go back to reference Sarnovsky M, Paralic J (2020) Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12(2):203CrossRef Sarnovsky M, Paralic J (2020) Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12(2):203CrossRef
38.
go back to reference Anderson B et al (2011) Graph-based malware detection using dynamic analysis. J Comput Virol 7:247–258 Anderson B et al (2011) Graph-based malware detection using dynamic analysis. J Comput Virol 7:247–258
39.
go back to reference Santos I et al (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82 Santos I et al (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82
40.
go back to reference Salehi Z, Sami A, Ghiasi M (2014) Using feature generation from API calls for malware detection. Comput Fraud Secur 2014(9):9–18CrossRef Salehi Z, Sami A, Ghiasi M (2014) Using feature generation from API calls for malware detection. Comput Fraud Secur 2014(9):9–18CrossRef
41.
go back to reference Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Appl 9(5):205–216 Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Appl 9(5):205–216
42.
go back to reference Yan P, Yan Z (2018) A survey on dynamic mobile malware detection. Software Qual J 26(3):891–919CrossRef Yan P, Yan Z (2018) A survey on dynamic mobile malware detection. Software Qual J 26(3):891–919CrossRef
43.
go back to reference Ma Z et al (2020) Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:2002.03594 Ma Z et al (2020) Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:​2002.​03594
Metadata
Title
An Exploration of Machine Learning Approaches in the Field of Cybersecurity
Authors
Brajesh Kumar Khare
Imran Khan
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_24