APPLICATION OF MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR CYBER SECURITY

Authors

  • Sangeeta Singh Research Scholar, Department of CSE & CSA, Madhav University, Pindwada, Rajasthan, India
  • Dr. Ganpat Joshi Professor, Department of CSE & CSA, Madhav University, Pindwada, Rajasthan, India

DOI:

https://doi.org/10.29121/shodhkosh.v5.i1.2024.3997

Keywords:

Machine Learning, Intrusion Detection System, Deep Learning, Cybersecurity

Abstract [English]

Cybersecurity has become a fundamental necessity for all local and governmental organizations in today's digital landscape. Consequently, cybersecurity professionals have started to leverage machine learning and deep learning techniques to create and implement secure systems. So Cybersecurity has emerged as a crucial area of research. It focuses on three primary aspects: machine learning, deep learning, and cybersecurity itself. The review highlights important research on machine learning (ML) and deep learning (DL) techniques applied to intrusion detection within cybersecurity. It provides an in-depth analysis of the critical functions that ML and DL serve in this domain, encompassing both theoretical models and practical implementations.. Moreover, the paper establishes criteria for evaluating ML and DL methodologies and analyzes the complexities associated with different algorithms. Recognizing the critical role of data in these approaches, the paper highlights the datasets employed for analyzing network traffic and identifying anomalies. It emphasizes significant research on ML and DL techniques applied in network intrusion detection and offers a succinct overview of each method.
Additionally, this paper features a comparative analysis and explores how machine learning (ML) and deep learning (DL) are transforming cybersecurity, machine learning and deep learning algorithms employed in intrusion detection systems, focusing on learning algorithms, performance metrics, datasets, and specific attack scenarios. The applications of ML and DL in addressing cybersecurity threats are thoroughly discussed. Furthermore, it discusses the application encountered in the implementation of ML and DL in the cybersecurity field and suggests potential directions for future research.

References

G. C. Fernandez, ‘‘Deep learning approaches for network intrusion detec- tion,’’ M.S. thesis, Dept. Comput. Sci., Univ. Texas at San Antonio, San Antonio, TX, USA, 2019.

A. Kim, M. Park, and D. H. Lee, ‘‘AI-IDS: Application of deep learning to real-time web intrusion detection,’’ IEEE Access, vol. 8, pp. 70245–70261, 2020.

A. Kim, M. Park, and D. H. Lee, ‘‘AI-IDS: Application of deep learning to real-time web intrusion detection,’’ IEEE Access, vol. 8, pp. 70245–70261, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2986882

Choudhury and A. Bhowal, “Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection,” in 2015International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015. DOI: https://doi.org/10.1109/ICSTM.2015.7225395

H. Benmeziane, ‘‘Comparison of deep learning frameworks and compil- ers,’’ M.S. thesis Comput. Sci., Inst. Nat. Formation Informatique, École nationale Supérieure d’Informatique, Oued Smar, Algeria, 2020.

N. Chaabouni, ‘‘Intrusion detection and prevention for IoT systems using machine learning,’’ Ph.D. dissertation, School Math. Comput. Sci., Uni- versité de Bordeaux, Bordeaux, France, 2020.

Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, and M. Gao, ‘‘Machine learning and deep learning methods for cybersecurity,’’ IEEE Access, vol. 6, pp. 35365–35381, 2018, doi: 10.1109/ACCESS.2018.2836950. DOI: https://doi.org/10.1109/ACCESS.2018.2836950

JayKumarJain et al. Int “A Literature Review on Machine Learning for Cyber Security Issues , IJSRCSEIT, Volume 8,Issue 6, 2022, 374-385, doi:https://doi.org/10.32628/CSEIT228654 DOI: https://doi.org/10.32628/CSEIT228654

S. Bozkurt, G. Elibol, S. Gunal, and U. Yayan, “A Comparative StudyonMachine Learning Algorithms for Indoor Positioning.”

Berman, Daniel S., et al. "A survey of deep learning methods for cybersecurity." Information 10.4 (2019): 122. https://doi.org/10.3390/info10040122. DOI: https://doi.org/10.3390/info10040122

N. M. Elaraby, M. Elmogy, and S. Barakat, “Deep Learning: Effective Tool for Big Data Analytics”, International Journal of Computer Science Engineering (IJCSE),Sep 2015.

Kaloudi, N.; Jingyue, L.I. The AI-based cyber threat landscape: A survey. ACM Comput. Surv. 2020, 53, 20. [CrossRef] DOI: https://doi.org/10.1145/3372823

Laghari, S.U.A.; Manickam, S.; Al-Ani, A.K.; Rehman, S.U.; Karuppayah, S. SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape. IEEE Access 2021, 9, 154380–154394. [CrossRef] DOI: https://doi.org/10.1109/ACCESS.2021.3127515

M. Gheisari, G. Wang, and M. Z. A. Bhuiyan, “A Survey on Deep Learning in Big Data,” in 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017. DOI: https://doi.org/10.1109/CSE-EUC.2017.215

Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198. [CrossRef] DOI: https://doi.org/10.3390/electronics11020198

Ahamad, B.; Khan, M.A.; Khan, J.; Alghamdi, A.A. Cybersecurity Challenges and Threats in Adoption of Industry 4.0: A Disscussion over Integration of Blockchain. Int. J. Early Child. Spec. Educ. 2022, 14, 3616–3623. [CrossRef]

Torbacki, W. A hybrid mcdm model combining danp and promethee ii methods for assessment of cybersecurity in industry 4.0. Sustainability 2021, 13, 8833. [CrossRef] DOI: https://doi.org/10.3390/su13168833

Saghezchi, F.B.; Mantas, G.; Violas, M.A.; de Oliveira Duarte, A.M.; Rodriguez, J. Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics 2022, 11, 602. [CrossRef] DOI: https://doi.org/10.3390/electronics11040602

Aouedi, O.; Piamrat, K.; Muller, G.; Singh, K. Federated Semi-Supervised Learning for Attack Detection in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2022, 19, 286–295. [CrossRef]seventy DOI: https://doi.org/10.1109/TII.2022.3156642

Kuang, F.; Zhang, S.; Jin, Z.; Xu, W. A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Comput. 2015, 19, 1187–1199. [CrossRef] DOI: https://doi.org/10.1007/s00500-014-1332-7

Syarif, A.R.; Gata, W. Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In Proceedings of the 2017 11th International Conference on Information & Communication Technology and System (ICTS), Surabaya, Indonesia, 31 October 2017; pp. 181–186. DOI: https://doi.org/10.1109/ICTS.2017.8265667

Pajouh, H.H.; Dastghaibyfard, G.; Hashemi, S. Two-tier network anomaly detection model: A machine learning approach. J. Intell. Inf. Syst. 2017, 48, 61–74. [CrossRef] DOI: https://doi.org/10.1007/s10844-015-0388-x

Mahmood, H.A. Network Intrusion Detection System (NIDS) in Cloud Environment based on Hidden Naïve Bayes Multiclass Classifier. Al-Mustansiriyah J. Sci. 2018, 28, 134–142. [CrossRef] DOI: https://doi.org/10.23851/mjs.v28i2.508

Shah, R.; Qian, Y.; Kumar, D.; Ali, M.; Alvi, M. Network intrusion detection through discriminative feature selection by using sparse logistic regression. Future Internet 2017, 9, 81. [CrossRef] DOI: https://doi.org/10.3390/fi9040081

Peng, K.; Leung, V.C.; Huang, Q. Clustering approach based on mini batch kmeans for intrusion detection system over big data. IEEE Access 2018, 6, 11897–11906. [CrossRef] DOI: https://doi.org/10.1109/ACCESS.2018.2810267

Hongyu Liu * and Bo Lang Review Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey, Beijing, Appl. Sci. 2019, 9, 4396, pp. 2-28 DOI: https://doi.org/10.3390/app9204396

Muhammad Imran Tariq et al, A Review of Deep Learning Security and Privacy Defensive Techniques Volume 2020, Article ID6535834, 18 pages https://doi.org/10.1155/2020/6535834 DOI: https://doi.org/10.1155/2020/6535834

Naveen KumarThawait, “Machine Learning in Cybersecurity: Applications, Challenges and Future Directions”, Int.J.Sci.Res.Comput.Sci.Eng.Inf.Technol., May-June-2024,10(3): Volume10,Issue3, 16-27 |http://ijsrcseit.com DOI: https://doi.org/10.32628/CSEIT24102125

Said A. Salloum et al. “MachineLearningandDeepLearningTechniquesforCybersecurity:AReview”, ©SpringerNatureSwitzerlandAG2020A.-E.Hassanienetal.(Eds.):AICV2020,AISC1153, pp.50–57,2020.https://doi.org/10.1007/978-3-030-44289-7_5 DOI: https://doi.org/10.1007/978-3-030-44289-7_5

PramilaP.Shinde, “A Review of Machine Learning and Deep Learning Applications”, Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018 DOI: https://doi.org/10.1109/ICCUBEA.2018.8697857

Saeed, S.; Suayyid, S.A.;Al-Ghamdi, M.S.; Al-Muhaisen, H.;Almuhaideb, A.M. A SystematicLiteratureReviewonCyberThreatIntelligence for OrganizationalCybersecurity Resilience. Sensors2023, 23, 7273.https://doi.org/10.3390/s23167273 DOI: https://doi.org/10.3390/s23167273

M. Alazab, M. Tang (eds.), Deep Learning Applications for Cyber Security, Advanced Sciences and Technologies for Security Applications, https://doi.org/10.1007/978-3-030-13057-2_2 DOI: https://doi.org/10.1007/978-3-030-13057-2_2

M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," Journal of In-formation Security and Applications, vol. 50, no. 102419, 2020. https://doi.org/10.1016/ j.jisa.2019.102419 DOI: https://doi.org/10.1016/j.jisa.2019.102419

Downloads

Published

2024-06-30

How to Cite

Singh, S., & Joshi, G. (2024). APPLICATION OF MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR CYBER SECURITY. ShodhKosh: Journal of Visual and Performing Arts, 5(1), 1129–1142. https://doi.org/10.29121/shodhkosh.v5.i1.2024.3997