Machine Learning for Biometrics 2022
DOI: 10.1016/b978-0-323-85209-8.00007-9
|View full text |Cite
|
Sign up to set email alerts
|

Contemporary survey on effectiveness of machine and deep learning techniques for cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Our findings underscored the critical need for human oversight in AI-driven cybersecurity solutions [9], [2], [59]. The occurrence of hallucinations and the variability in LLM performance in different scenarios highlight the limitations of AI in fully understanding the nuances of human communication and decision-making in complex situations [45], [1]. Human oversight in AI-driven ransomware negotiations can provide several benefits [10], [15].…”
Section: A the Need For Human Oversightmentioning
confidence: 74%
“…Our findings underscored the critical need for human oversight in AI-driven cybersecurity solutions [9], [2], [59]. The occurrence of hallucinations and the variability in LLM performance in different scenarios highlight the limitations of AI in fully understanding the nuances of human communication and decision-making in complex situations [45], [1]. Human oversight in AI-driven ransomware negotiations can provide several benefits [10], [15].…”
Section: A the Need For Human Oversightmentioning
confidence: 74%
“…Parallel processing and deep learning techniques are preferred in processing these data given their high speed and accuracy. Deep learning techniques have also been used in recent years to detect malware [72][73][74]. Malicious programs have many characteristics that can affect systems by modifying their data.…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%
“…Upon detection of an intrusive activity, the Intrusion Detection System (IDS) reports the intrusion to a SIEM (Security Information and Event Management) system where determination of valid threats is carried out amidst every other alarm, false or not [117. However, with much time spent in threat determination, there is a window for more damage to be perpetrated on the system or network because whereas IDSs are instrumental in network monitoring, the significance of their implementation relies on what is done with the information they generate, which means that they do not necessarily resolve security issues hence cannot add security layers unless appropriate policies to stop the identified threats are administered [118].…”
Section: Common Non-artificial Intelligence Based Techniquesmentioning
confidence: 99%