A Literature Review on Machine Learning for Cyber Security Issues

Authors

  • Jay Kumar Jain  Department of Computer Science and Engineering, AKS University, Satna, Madhya Pradesh, India
  • Akhilesh A. Waoo  Department of Computer Science and Engineering, AKS University, Satna, Madhya Pradesh, India
  • Dipti Chauhan  Professor, Department of Computer Science and Engineering, PIEMR, Indore, Madhya Pradesh, India

DOI:

https://doi.org/10.32628/CSEIT228654

Keywords:

Cyber-security issues, machine learning, algorithms, detection.

Abstract

Through the use of relevant data to build an algorithm, machine learning primarily aims to automate human help. A subset of artificial intelligence (AI), machine learning (ML) focuses on the development of systems that can learn from past data, recognize patterns, and reach logical conclusions with little to no human involvement. The concept of cyber security involves guarding against hostile attack on digital systems such computers, servers, mobile devices, networks, and the data they are connected to. Accounting for cyber security where machine learning is used and using machine learning to enable cyber security are the two main components of combining cyber security and ML. We may benefit from this union in a number of ways, including by giving machine learning models better security, enhancing the effectiveness of cyber security techniques, and supporting the efficient detection of zero day threats with minimal human involvement. In this review paper, we combine ML and cyber security to talk about two distinct notions. We also talk about the benefits, problems, and difficulties of combining ML and cyber security. In addition, we explore several attacks and present a thorough analysis of various tactics in two different categories. Finally, we offer a few suggestions for future research.

References

  1. Chauhan, D., and J. K. Jain. "A Journey from IoT to IoEA Journey from IoT to IoE." International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075.
  2. Z. Lv, L. Qiao, J. Li, H. Song, Deep-learning-enabled security issues in the internet of things, IEEE Internet Things J. 8 (12) (2021) 9531–9538.
  3. Y. Wang, J. Yu, B. Yan, G. Wang, Z. Shan, BSV-PAGS: Blockchain based special vehicles priority access guarantee scheme, Comput. Commun. 161 (2020) 28–40.
  4. N. Magaia, R. Fonseca, K. Muhammad, A.H.F.N. Segundo, A.V. Lira Neto, V.H.C. de Albuquerque, Industrial internet-of-things security enhanced with deep learning approaches for smart cities, IEEE Internet Things J. 8 (8) (2021) 6393–6405.
  5. S.A. Parah, J.A. Kaw, P. Bellavista, N.A. Loan, G.M. Bhat, K. Muhammad, V.H.C. de Albuquerque, Efficient security and authentication for edge-based internet of medical things, IEEE Internet Things J. 8 (21) (2021) 15652–15662.
  6. Ho, Samson, et al. "A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network." IEEE Open Journal of the Computer Society 2 (2021): 14-25.
  7. Praneeth Narisetty, Pavan Narra "A MACHINE LEARNING APPROACH FOR DETECTING CYBERATTACKS IN NETWORKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 6, page no. ppg26-g31, June-2022, Available at : http://www.jetir.org/papers/JETIR2206605.pdf
  8. Tufan, Emrah, Cihangir Tezcan, and Cengiz Acartürk. "Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network." IEEE Access 9 (2021): 50078-50092.
  9. Sarker, Iqbal H., et al. "Intrudtree: a machine learning based cyber security intrusion detection model." Symmetry 12.5 (2020): 754.
  10. Abdeldayem, Mohamed M. "Intrusion Detection System Based on Pattern Recognition." Arabian Journal for Science and Engineering (2022): 1-9.
  11. Y. Sun, A.K. Bashir, U. Tariq, F. Xiao, Effective malware detection scheme based on classified behavior graph in IIoT, Ad Hoc Netw. 120 (2021) 102558.
  12. J. Yang, Z. Bian, J. Liu, B. Jiang, W. Lu, X. Gao, H. Song, Noreference quality assessment for screen content images using visual edge model and AdaBoosting neural network, IEEE Trans. Image Process. 30 (2021) 6801–6814.
  13. Y. Zhao, J. Yang, Y. Bao, H. Song, Trustworthy authorization method for security in industrial internet of things, Ad Hoc Netw. 121 (C) (2021).
  14. T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput. 51 (5) (2002) 541–552.
  15. M.R.K. Soltanian, I.S. Amiri, Chapter 3 - problem solving, investigating ideas, and solutions, in: M.R.K. Soltanian, I.S. Amiri (Eds.), Theoretical and Experimental Methods for Defending Against DDOS Attacks, Syngress, 2016, pp. 33–45.
  16. T. Lei, Z. Qin, Z. Wang, Q. Li, D. Ye, EveDroid: Event-aware android malware detection against model degrading for IoT devices, IEEE Internet Things J. 6 (4) (2019) 6668–6680.
  17. J. Steinhardt, P.W. Koh, P. Liang, Certified defenses for data poisoning attacks, in: 31st International Conference on Neural Information Processing Systems, in: NIPS’17, Curran Associates Inc. Long Beach, California, USA, 2017, pp. 3520–3532.
  18. M. Aladag, F.O. Catak, E. Gul, preventing data poisoning attacks by using generative models, in: 1st International Informatics and Software Engineering Conference, UBMYK, Ankara, Turkey, 2019, pp. 1–5, http://dx.doi.org/10.1109/UBMYK48245.2019.8965459.
  19. C. Huang, S. Chen, Y. Zhang, W. Zhou, J.J.P.C. Rodrigues, V.H.C. de Albuquerque, a robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning, IEEE Internet Things J. (2021) 1, http://dx.doi.org/10.1109/JIOT.2021. 3128531.
  20. N. Papernot, P. McDaniel, X. Wu, S. Jha, A. Swami, Distillation as a defense to adversarial perturbations against deep neural networks, in: 2016 IEEE Symposium on Security and Privacy, 2016, pp. 582–597, http://dx.doi.org/10.1109/SP.2016.41.
  21. N. Papernot, A marauder’s map of security and privacy in machine learning, in: 11th ACM Workshop on Artificial Intelligence and Security, Toronto, Canada, 2018.
  22. S. Pirbhulal, W. Wu, K. Muhammad, I. Mehmood, G. Li, V.H.C. de Albuquerque, Mobility enabled security for optimizing IoT based intelligent applications, IEEE Netw. 34 (2) (2020) 72–77.
  23. Chauhan, Dipti, Jay Kumar Jain, and Sanjay Sharma. "An end-to-end header compression for multihop IPv6 tunnels with varying bandwidth." 2016 Fifth international conference on eco-friendly computing and communication systems (ICECCS). IEEE, 2016.
  24. Jain, Jay Kumar, Devendra Kumar Jain, and Anuradha Gupta. "Performance analysis of node-disjoint multipath routing for mobile ad-hoc networks based on QOS." International Journal of Computer Science and Information Technologies 3.5 (2012): 5000-5004.
  25. Waoo, A., and Sanjay Sharma. "Threshold Sensitive Stable Election Multi-path Energy Aware Hierarchical Protocol for Clustered Heterogeneous Wireless Sensor Networks." International Journal of Recent Trends in Engineering & Research 3.09 (2017): 158-16.
  26. Jain, Jay Kumar, and Sanjay Sharma. "Performance Evaluation of Hybrid Multipath Progressive Routing Protocol for MANETs." International Journal of Computer Applications 71.18 (2013).
  27. Jain, Jay Kumar, and Akhilesh A. Waoo. "An Analytical Study of Energy Efficient Routing Approaches in Wireless Sensor Network." THEETAS 2022: Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India. European Alliance for Innovation, 2022.
  28. J. K. Jain, C. S. Dangi and D. Chauhan, "An Efficient Multipath Productive Routing Protocol for Mobile Ad-hoc Networks," 2020 IEEE International Conference for Innovation in Technology (INOCON), 2020, pp. 1-5, doi: 10.1109/INOCON50539.2020.9298291.

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
Jay Kumar Jain, Akhilesh A. Waoo, Dipti Chauhan, " A Literature Review on Machine Learning for Cyber Security Issues" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 6, pp.374-385, November-December-2022. Available at doi : https://doi.org/10.32628/CSEIT228654