Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
Kamran Shaukat,Suhuai Luo,Vijay Varadharajan,Ibrahim A. Hameed,Shan Chen,Dongxi Liu,Jiaming Li +6 more
Reads0
Chats0
TLDR
A brief review of different machine learning techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks, and the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity.Abstract:
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.read more
Citations
More filters
Journal ArticleDOI
Machine learning
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Journal ArticleDOI
A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
TL;DR: This paper aims to provide a comprehensive overview of the challenges that ML techniques face in protecting cyberspace against attacks, by presenting a literature on ML techniques for cyber security including intrusion detection, spam detection, and malware detection on computer networks and mobile networks in the last decade.
Journal ArticleDOI
An Investigation of Credit Card Default Prediction in the Imbalanced Datasets
Talha Mahboob Alam,Kamran Shaukat,Ibrahim A. Hameed,Suhuai Luo,Muhammad Umer Sarwar,Shakir Shabbir,Jiaming Li,Matloob Khushi +7 more
TL;DR: A model is developed for credit default prediction by employing various credit-related datasets and the performance of classifiers is better on the balanced dataset as compared to the imbalanced dataset, and the Gradient Boosted Decision Tree method performs better than other traditional machine learning classifiers.
Journal Article
Unveiling Zeus automated classification of malware samples
Abedelaziz Mohaisen,Omar Alrawi +1 more
TL;DR: It is shown that artifacts like file system, registry, and network features can be used to identify distinct malware families with high accuracy - in some cases as high as 95 percent.
References
More filters
Book
Data Mining: Practical Machine Learning Tools and Techniques
TL;DR: This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining.
Journal ArticleDOI
A Tutorial on Support Vector Machines for Pattern Recognition
TL;DR: There are several arguments which support the observed high accuracy of SVMs, which are reviewed and numerous examples and proofs of most of the key theorems are given.
Journal ArticleDOI
Machine learning
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Programs for Machine Learning
Steven L. Salzberg,Alberto Segre +1 more
TL;DR: In his new book, C4.5: Programs for Machine Learning, Quinlan has put together a definitive, much needed description of his complete system, including the latest developments, which will be a welcome addition to the library of many researchers and students.