Keywords:-
Article Content:-
Abstract
Cyber security is like a moving target—hackers are always coming up with new tricks, so systems that just look for “known” issues can’t keep up anymore. That’s where machine learning (ML) comes in. Instead of following fixed rules, ML looks for anything unusual or suspicious in huge amounts of data. This means it can spot new types of threats much faster than traditional methods. In this paper, we explore how ML is being used for things like catching malware, stopping phishing attacks, and detecting intrusions in networks. We also talk about the tough parts, like needing lots of good data, powerful computers, and making sure attackers don’t fool the ML systems. Our results show that while ML is a big help, it’s not a silver bullet. The best protection happens when ML works together with traditional security tools and the know-how of human experts.
References:-
References
Anti-Phishing Working Group, “Phishing and Fraud solutions”. [Online]. Available:
http://www.antiphishing.org/. [Accesses: April 4, 2013].
Bharadiya, J. P. (2023), “A Comprehensive Survey of Deep Learning Techniques Natural Language Processing”, European Journal of Technology, 7(1), 58 - 66.
https://doi.org/10.47672/ejt.1473
Bharadiya, J. P. (2023), “Convolutional Neural Networks for Image Classification. International Journal of Innovative Science and Research Technology”, 8(5), 673 - 677.
https://doi.org/10.5281/zenodo.7952031
Bharadiya, J. P., Tselios, N. T., & Reddy, M. (2023), “Forecasting of Crop Yield using Remote Sensing Data”, Agrarian Factors and Machine Learning Approaches. Journal of Engineering Research and Reports, 24(12), 29–44.
https://doi.org/10.9734/jerr/2023/v24i12858
Densham B. ,”Three cyber-security strategies to mitigate the impact of a data breach.” Netw Secur. 2015;2015(1):5–8.
Hariri RH, Fredericks EM, Bowers KM. “Uncertainty in big data analytics: survey, opportunities, and challenges”, J Big Data. 2019;6(1):44.
Knowledge Discovery and Data Mining group, “KDD cup 1999”. [Online]. Available:
http://www.kdd.org/kddcup/index.php. [Accessed: March 3, 2013].
L. F. Cranor, S. Egelman, J. Hong, and Y. Zhang, “Phinding phish: An evaluation of anti- phishing toolbars”, Technical Report CMUCyLab-06-018, CMU, November 2006.
Nallamothu, P. T., & Bharadiya, J. P. (2023),”Artificial Intelligence in Orthopedics: A Concise Review.” Asian Journal of Orthopaedic Research, 6(1), 17–27. Retrieved from
https://journalajorr.com/index.php/AJORR/article/view/164
Qiao L-B, Zhang B-F, Lai Z-Q, Su J-S, “Mining of attack models in ids alerts from network backbone by a two-stage clustering method”, In: 2012 IEEE 26th international parallel and distributed processing symposium workshops & Phd Forum. IEEE; 2012. p. 1263–9.
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, “A Comparison of Machine Learning Techniques for Phishing Detection”, APWG eCrime Researchers Summit, October 4-5, 2007, Pittsburg, PA.