2020
DOI: 10.1177/1548512920951275
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning in cybersecurity: a comprehensive survey

Abstract: Today’s world is highly network interconnected owing to the pervasiveness of small personal devices (e.g., smartphones) as well as large computing devices or services (e.g., cloud computing or online banking), and thereby each passing minute millions of data bytes are being generated, processed, exchanged, shared, and utilized to yield outcomes in specific applications. Thus, securing the data, machines (devices), and user’s privacy in cyberspace has become an utmost concern for individuals, business organizat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 106 publications
(52 citation statements)
references
References 187 publications
(241 reference statements)
0
38
0
2
Order By: Relevance
“…Dipankar et al [50] included a comprehensive survey of works on cyber security ML (2013 to 2018), the bases and corresponding protection of cyber-attacks, the basics of the most popular ML algorithms and proposed ML and cyber security data mining schemes for features, dimension reduction and classification and detection. This article also offers a summary of adversary ML, including safety features of deep learning methods.…”
Section: Prevention Of Cyber-attacks and Threats Using Aimentioning
confidence: 99%
“…Dipankar et al [50] included a comprehensive survey of works on cyber security ML (2013 to 2018), the bases and corresponding protection of cyber-attacks, the basics of the most popular ML algorithms and proposed ML and cyber security data mining schemes for features, dimension reduction and classification and detection. This article also offers a summary of adversary ML, including safety features of deep learning methods.…”
Section: Prevention Of Cyber-attacks and Threats Using Aimentioning
confidence: 99%
“…CS professionals are constantly instituting and upgrading both automatic and user-augmented processes to mitigate risks, such as through patching problematic software, developing new and user-friendly authentication techniques, and machine learning techniques that help identify and minimize the harmful impact of bad actors. [14][15][16] These efforts sometimes go undetected by end users because automatic processes that have been refined over the years tend to be successful at defending against low-level threats that most standard antivirus is capable of neutralizing. 17 Even on an organizational level, a company might implement algorithmically-based policies to minimize automatic downloading of images or files for incoming emails flagged as potential spam, rather than relying on the human to determine how risky clicking on an unsolicited attachment might be.…”
Section: Human Errormentioning
confidence: 99%
“…Some other notable works in that year are meta-learningbased robust detection methods to detect new adversarial attacks with limited examples developed by [44]. Another important and influential work done by [15], where they tried to keep the records of query and used KNN to co-relate that with adversarial examples In summary, defenses against adversarial attacks can be classified in two ways: attack detection and robust recognition model [19]. Detection is a binary classification problem, where input is classified as adversarial or not.…”
Section: Related Workmentioning
confidence: 99%