Open Access Open Access  Restricted Access Subscription or Fee Access

Machine Learning Model based Cyber Security using Behavioral Analysis

Qian Chen, Joseph Bonneau

Abstract


The considerable number of articles cover machine learning for cybersecurity and the ability to protect us from cyberattacks. Still, it’s important to scrutinize how actually Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL) can help in cybersecurity right now, and what this hype is all about. One of the most common causes for cyber-attacks is owed to the intruder. So enhanced the process of security by avoiding intrusion at various levels of the layers in the network system, the help of artificial intelligence is utilized. The main objective of the paper is to create a program that can defend itself from various network attacks and intrusion detection. This situation can be handled by applying methods of artificial intelligence that provide flexibility and learning capability to software. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic.


Keywords


Cyber Attacks, Intrusion Detection, Artificial Intelligence.

Full Text:

PDF

References


Barford P, Dacier M, Dietterich TG, Fredrikson M, Giffin J, Jajodia S, Jha S, Li J, Liu P, Ning P, Ou X. Cyber SA: Situational awareness for cyber defense. InCyber situational awareness 2010 (pp. 3-13). Springer, Boston, MA.

Dasgupta, D. (2006, October). Computational intelligence in cyber security. In 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (pp. 2-3). IEEE.

Pelusi, Luciana, Andrea Passarella, and Marco Conti. "Opportunistic networking: data forwarding in disconnected mobile ad hoc networks." IEEE communications Magazine 44.11 (2006): 134-141.

Goodwin C, Nicholas JP, Bryant J, Ciglic K, Kleiner A, Kutterer C, Massagli A, Mckay A, Mckitrick P, Neutze J, Storch T. A framework for cybersecurity information sharing and risk reduction. Microsoft. 2015 Jan.

Nguyen TT, Armitage G. A survey of techniques for internet traffic classification using machine learning. IEEE communications surveys & tutorials. 2008 Oct 1;10 (4):56-76.

Kabalci, Yasin. "A survey on smart metering and smart grid communication." Renewable and Sustainable Energy Reviews 57 (2016): 302-318.

Kohavi, Ronny, and J. Ross Quinlan. "Data mining tasks and methods: Classification: decision-tree discovery." Handbook of data mining and knowledge discovery. Oxford University Press, Inc., 2002.

Gupta, Abhishek, et al. "Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks." 2013 IEEE International Conference on Computational Intelligence and Computing Research. IEEE, 2013.

Delkesh, Taher, and Mohammad Ali Jabraeil Jamali. "EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs." Journal of Ambient Intelligence and Humanized Computing 10.5 (2019): 1897-1914.

Ghassemlooy, Zabih, Wasiu Popoola, and Sujan Rajbhandari. Optical wireless communications: system and channel modelling with Matlab®. CRC press, 2019.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.