A REVIEW OF THE APPLICATIONS OF MACHINE LEARNING IN CYBERSECURITY AND ITS CHALLENGES

Authors

  • Aishwarya Ulhas Desai Independent Researcher, India

DOI:

https://doi.org/10.29121/digisecforensics.v1.i1.2024.17

Keywords:

Machine Learning, Cybersecurity, Deep Learning, Cyber-Attack, Malware Detection, Phishing URL, Network Intrusion Detection

Abstract

Our study aims to identify use of Machine Learning (ML) to solve cybersecurity problems and its challenges. ML algorithms are used for malicious network traffic detection, phishing Universal Resource Locator (URLs) detection, malware analysis, and more. Based on the review of selected articles, it is inferred that high-quality data sets, efficient feature extraction, proper training, and testing of ML mode can deliver accurate detection model. Even though the integration of ML in cybersecurity can improve threat detection capabilities, there are some challenges, including limited availability of real-world cyber datasets to train the ML models, the vulnerability of the ML model to data poisoning, imbalanced data sets causing biased detection, and data protection laws making hard to collect necessary data to train and test the ML model efficiently.

References

Bharadiya, J. (2023). Machine Learning in Cybersecurity: Techniques and Challenges. European Journal of Technology, 7(2), 1-14. https://doi.org/10.47672/ejt.1486 DOI: https://doi.org/10.47672/ejt.1486

Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine Learning in Cybersecurity: A Comprehensive Survey. The Journal of Defense Modeling and Simulation, 19(1), 57-106. https://doi.org/10.1177/1548512920951275 DOI: https://doi.org/10.1177/1548512920951275

Rao, B. B., & Swathi, K. (2017). Fast kNN Classifiers for Network Intrusion Detection System. Indian J. Sci. Technol., 10(14), 1-10. https://doi.org/10.17485/ijst/2017/v10i14/93690 DOI: https://doi.org/10.17485/ijst/2017/v10i14/93690

Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine Learning Based Phishing Detection from URLs. Expert Systems with Applications, 117, 345-357. https://doi.org/10.1016/j.eswa.2018.09.029 DOI: https://doi.org/10.1016/j.eswa.2018.09.029

Ucci, D., Aniello, L., & Baldoni, R. (2019). Survey of Machine Learning Techniques for Malware Analysis. Computers & Security, 81, 123-147. https://doi.org/10.1016/j.cose.2018.11.001 DOI: https://doi.org/10.1016/j.cose.2018.11.001

Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., & Wang, C. (2018). Machine Learning and Deep Learning Methods for Cybersecurity. Ieee Access, 6, 35365-35381. https://doi.org/10.1109/ACCESS.2018.2836950 DOI: https://doi.org/10.1109/ACCESS.2018.2836950

Downloads

Published

2024-08-02

How to Cite

Desai, A. U. (2024). A REVIEW OF THE APPLICATIONS OF MACHINE LEARNING IN CYBERSECURITY AND ITS CHALLENGES. Journal of Digital Security and Forensics, 1(1), 26–29. https://doi.org/10.29121/digisecforensics.v1.i1.2024.17