2019
DOI: 10.2139/ssrn.3370181
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Machine Learning Algorithms for Countermeasures to Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…In 2019, Chachra et al [45] discussed machine learning strategies for identifying the relationship of such strategies to cybersecurity. Machine learning is based on algorithms that learn from previous experiences to understand reoccurring patterns instead of programming the patterns themselves.…”
Section: Ai-based Cyberattacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2019, Chachra et al [45] discussed machine learning strategies for identifying the relationship of such strategies to cybersecurity. Machine learning is based on algorithms that learn from previous experiences to understand reoccurring patterns instead of programming the patterns themselves.…”
Section: Ai-based Cyberattacksmentioning
confidence: 99%
“…Computing devices and the internet have become an integral part of our society, and security professionals must adopt comprehensive strategies to counter the threats posed by AI-powered attacks. From this perspective, the researchers in [45] presented methods used to counter cyber security attacks and their relationship with machine learning models. The researchers have identified pitfalls and characterize challenges regarding machine learning algorithms in cybersecurity attacks.The researchers employed three basic network security systems for countering external and internal security breaches-namely, signature-based, anomaly-based, and hybrid.…”
Section: Mitigation Strategiesmentioning
confidence: 99%
“…Machine learning has a proven ability to forecast future risks and threats, recognize threat patterns, and detect anomalies [14]. These capabilities have led to the development of several ML-based cybersecurity pipelines [15,16] in various industrial sectors.…”
Section: Introductionmentioning
confidence: 99%