Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Tytuł pozycji:

Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity

Tytuł:
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
Autorzy:
Kamran Shaukat
Suhuai Luo
Vijay Varadharajan
Ibrahim A. Hameed
Shan Chen
Dongxi Liu
Jiaming Li
Temat:
cybersecurity
machine learning
malware detection
intrusion detection system
spam classification
Technology
Źródło:
Energies, Vol 13, Iss 10, p 2509 (2020)
Wydawca:
MDPI AG, 2020.
Rok publikacji:
2020
Kolekcja:
LCC:Technology
Typ dokumentu:
article
Opis pliku:
electronic resource
Język:
English
ISSN:
1996-1073
Relacje:
https://www.mdpi.com/1996-1073/13/10/2509; https://doaj.org/toc/1996-1073
DOI:
10.3390/en13102509
Dostęp URL:
https://doaj.org/article/cbb1a8b8440646da8e06e2989a0d1fa9  Link otwiera się w nowym oknie
Numer akcesji:
edsdoj.bb1a8b8440646da8e06e2989a0d1fa9
Czasopismo naukowe
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.
Zaloguj się, aby uzyskać dostęp do pełnego tekstu.

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies