Leveraging Machine Learning to Improve Cybersecurity: Methods, Obstacles, and Prospects

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 205

This Paper With 21 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICRSIE09_390

تاریخ نمایه سازی: 12 اسفند 1403

Abstract:

This study intends to investigate how machine learning (ML) can be applied to improve cybersecurity measures, with a particular focus on systems for anomaly, fraud, malware, and intrusion detection. A total of ۷۴۳ academic papers were systematically reviewed; ۱۱۵ of these were chosen for further examination. Advances in machine learning techniques were assessed in the context of cybersecurity as part of the review process. The results show that machine learning (ML)-driven systems greatly increase the automation of security procedures, enhance the detection of new threats, and lower human error in cyber threat management. But obstacles like hostile attacks and the requirement for excellent model training stand in the way of the wider use of ML in cybersecurity. The paper addresses the ramifications of these results, highlighting the need to create resilient and flexible machine learning models that can resist hostile attacks and enhance integration across a range of cybersecurity applications. The knowledge gathered from this study highlights the necessity of ongoing innovation in threat detection systems and offers a thorough summary of the possible advantages and difficulties of applying machine learning to cybersecurity. The majority of the literature in this review is from Western contexts, which may cause it to miss insights from other regions. Additionally, one of the biggest obstacles still facing ML systems is their complexity when implemented in dynamic cyber environments. Future studies should focus on improving cybersecurity by integrating emerging technologies, improving ML algorithms to make them more resilient to adversarial threats, and filling in the gaps in the literature about the life cycle of ML models in practical applications.

Authors

Seyyed Mohammad Ali Abolmaali

MSc, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran

Reza Mohammadi

Assistant Professor, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran

Mohammad Nassiri

Associate Professor, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran