Advertisement

Applications of Machine Learning in Cyber Security - A Review and a Conceptual Framework for a University Setup

  • Rishabh Jain
  • Roheet BhatnagarEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 921)

Abstract

Machine learning is a growing technical field due to its versatility and stability for the ever increasing data flow from heterogeneous sources and computational demands. Machine learning techniques are deployed nearly in every aspect of computing today because of its highly adaptive and scalable characteristics. It has the potential to adapt to new and unknown challenges. Cyber-Security is a field which is rapidly developing these days because of the attention that is required to secure the net-works and applications with the growth in social networks, internet and mobile banking, cloud computing, web technologies, smart grid etc. The domain of Cyber Security owing to its diversity and applications generate lot of data which is voluminous and coming from different sources. Such data provides great scope to the data scientists, cyber security specialists and machine learning enthusiasts, since they have the potential to provide insights which could help in curbing Cyber Crimes using Machine Learning Algorithms. This paper reviews literature in the field of machine learning and cyber security and highlighting the key developments and improvements in these fields. The applications of machine learning algorithms in cyber security have been discussed in detail in the paper. This paper focuses on the critical and the technical aspects of the previous work carried out by other researchers in these fields culminating with a comprehensive conclusion about the state-of-art in the fields. It also discusses as to what should be done to further improvise the situation currently faced by data scientists and cyber security researchers around the world. The current paper also discusses a conceptual framework for a typical university setup to tackle the Cyber Security issues and the implementation work on the proposed solution strategies is in progress and the authors are working on it.

Keywords

Machine learning Cyber security Social networks Cloud computing 

References

  1. 1.
    Veiga, A.P.: Applications of artificial intelligence to network security. arXiv preprint arXiv:1803.09992 (2018)
  2. 2.
    Ford, V., Siraj, A.: Applications of machine learning in cyber security. In: Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering (2014)Google Scholar
  3. 3.
    Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A.: Characterization of TOR traffic using time based features. In: ICISSP, pp. 253–262 (2017)Google Scholar
  4. 4.
    Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 3, 80–90 (2016)Google Scholar
  5. 5.
    Gibert, D.: Convolutional neural networks for malware classification. Ph.D. thesis, MS Thesis, Department of Computer Science, UPC (2016)Google Scholar
  6. 6.
    Ma, T., Wang, F., Cheng, J., Yu, Y., Chen, X.: A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors 16(10), 1701 (2016)CrossRefGoogle Scholar
  7. 7.
    Torres, P., Catania, C., Garcia, S., Garino, C.G.: An analysis of recurrent neural networks for botnet detection behavior. In: 2016 IEEE Biennial Congress of Argentina (ARGENCON), pp. 1–6. IEEE (2016)Google Scholar
  8. 8.
    Rui, C., Jing, Y., Rong-gui, H., Shu-guang, H.: A novel LSTM-RNN decoding algorithm in captcha recognition. In: 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 766–771. IEEE (2013)Google Scholar
  9. 9.
    Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., Yagi, T.: Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 577–582. IEEE (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of ITManipal University JaipurJaipurIndia
  2. 2.Department of CSEManipal University JaipurJaipurIndia

Personalised recommendations