Full Text

Turn on search term navigation

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Machine learning is of rising importance in cybersecurity. The primary objective of applying machine learning in cybersecurity is to make the process of malware detection more actionable, scalable and effective than traditional approaches, which require human intervention. The cybersecurity domain involves machine learning challenges that require efficient methodical and theoretical handling. Several machine learning and statistical methods, such as deep learning, support vector machines and Bayesian classification, among others, have proven effective in mitigating cyber-attacks. The detection of hidden trends and insights from network data and building of a corresponding data-driven machine learning model to prevent these attacks is vital to design intelligent security systems. In this survey, the focus is on the machine learning techniques that have been implemented on cybersecurity data to make these systems secure. Existing cybersecurity threats and how machine learning techniques have been used to mitigate these threats have been discussed. The shortcomings of these state-of-the-art models and how attack patterns have evolved over the past decade have also been presented. Our goal is to assess how effective these machine learning techniques are against the ever-increasing threat of malware that plagues our online community.

Details

Title
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Author
Ahsan, Mostofa 1 ; Nygard, Kendall E 1 ; Gomes, Rahul 2   VIAFID ORCID Logo  ; Chowdhury, Md Minhaz 3   VIAFID ORCID Logo  ; Rifat, Nafiz 1 ; Connolly, Jayden F 2 

 Department of Computer Science, North Dakota State University, Fargo, ND 58102, USA; [email protected] (K.E.N.); [email protected] (N.R.) 
 Department of Computer Science, University of Wisconsin-Eau Claire, Eau Claire, WI 54701, USA; [email protected] 
 Department of Computer Science, East Stroudsburg University of Pennsylvania, East Stroudsburg, PA 18301, USA; [email protected] 
First page
527
Publication year
2022
Publication date
2022
Publisher
MDPI AG
ISSN
2624800X
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2716551975
Copyright
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.