2020
DOI: 10.1109/access.2020.3041951
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Machine Learning Techniques for Cyber Security in the Last Decade

Abstract: Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged cyberattacks. Cyber security techniques provide enhancements in security measures to detect and react against cyberattacks. The previously used security systems are no longer sufficient because cybercriminals are smart enough to evade conventional security systems. Conventional security systems lack efficiency in detecting previously unseen and polymo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 225 publications
(85 citation statements)
references
References 469 publications
(336 reference statements)
0
82
0
Order By: Relevance
“…If the majority of its neighbours classify an instance incorrectly, that instance is discarded [30]. 3) Cluster Centroids: This method performs k-means an d replaces the majority class samples with their respective cluster centroids to reduce the n u mb er of samples [31]. 4) Edited Nearest Neighbors (ENN): Each instance is tested using k-NN with the rest of the samples in t h is method.…”
Section: ) Data-level Methodsmentioning
confidence: 99%
“…If the majority of its neighbours classify an instance incorrectly, that instance is discarded [30]. 3) Cluster Centroids: This method performs k-means an d replaces the majority class samples with their respective cluster centroids to reduce the n u mb er of samples [31]. 4) Edited Nearest Neighbors (ENN): Each instance is tested using k-NN with the rest of the samples in t h is method.…”
Section: ) Data-level Methodsmentioning
confidence: 99%
“…Supervised algorithms learn a model allowing to classify any new observation (a data point) as either collected when a system is targeted by a malicious attack, or during normal operations. For example, the literature reports on the successful usage of Random Forests [44], Support Vector Machines [54], [82], Convolutional Deep Neural Networks [38], [55], [71] for the detection of attacks through the analysis of network traffic, assuming that those attacks are known at training time by the supervised ML algorithms.…”
Section: Detection Of Known and Unknown Attacksmentioning
confidence: 99%
“…e huge volume of network data has made intrusion detection issues amenable to machine learning (ML) methods, which have been successfully applied in natural language processing [8], recommendation system [9], etc. ML-based IDS has attracted much interest from researchers over the last decade [10][11][12]. ML-based IDS could be roughly divided into pattern recognition issues and anomaly detection issues despite its fuzzy boundary, which means that it overlaps with anomaly-based IDS to a large extent.…”
Section: Introductionmentioning
confidence: 99%