Skip to main content

Applications of Machine Learning in Cyber Security - A Review and a Conceptual Framework for a University Setup

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 921))

Abstract

Machine learning is a growing technical field due to its versatility and stability for the ever increasing data flow from heterogeneous sources and computational demands. Machine learning techniques are deployed nearly in every aspect of computing today because of its highly adaptive and scalable characteristics. It has the potential to adapt to new and unknown challenges. Cyber-Security is a field which is rapidly developing these days because of the attention that is required to secure the net-works and applications with the growth in social networks, internet and mobile banking, cloud computing, web technologies, smart grid etc. The domain of Cyber Security owing to its diversity and applications generate lot of data which is voluminous and coming from different sources. Such data provides great scope to the data scientists, cyber security specialists and machine learning enthusiasts, since they have the potential to provide insights which could help in curbing Cyber Crimes using Machine Learning Algorithms. This paper reviews literature in the field of machine learning and cyber security and highlighting the key developments and improvements in these fields. The applications of machine learning algorithms in cyber security have been discussed in detail in the paper. This paper focuses on the critical and the technical aspects of the previous work carried out by other researchers in these fields culminating with a comprehensive conclusion about the state-of-art in the fields. It also discusses as to what should be done to further improvise the situation currently faced by data scientists and cyber security researchers around the world. The current paper also discusses a conceptual framework for a typical university setup to tackle the Cyber Security issues and the implementation work on the proposed solution strategies is in progress and the authors are working on it.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Veiga, A.P.: Applications of artificial intelligence to network security. arXiv preprint arXiv:1803.09992 (2018)

  2. Ford, V., Siraj, A.: Applications of machine learning in cyber security. In: Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering (2014)

    Google Scholar 

  3. Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A.: Characterization of TOR traffic using time based features. In: ICISSP, pp. 253–262 (2017)

    Google Scholar 

  4. Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 3, 80–90 (2016)

    Google Scholar 

  5. Gibert, D.: Convolutional neural networks for malware classification. Ph.D. thesis, MS Thesis, Department of Computer Science, UPC (2016)

    Google Scholar 

  6. Ma, T., Wang, F., Cheng, J., Yu, Y., Chen, X.: A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors 16(10), 1701 (2016)

    Article  Google Scholar 

  7. Torres, P., Catania, C., Garcia, S., Garino, C.G.: An analysis of recurrent neural networks for botnet detection behavior. In: 2016 IEEE Biennial Congress of Argentina (ARGENCON), pp. 1–6. IEEE (2016)

    Google Scholar 

  8. Rui, C., Jing, Y., Rong-gui, H., Shu-guang, H.: A novel LSTM-RNN decoding algorithm in captcha recognition. In: 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 766–771. IEEE (2013)

    Google Scholar 

  9. Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., Yagi, T.: Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 577–582. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roheet Bhatnagar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, R., Bhatnagar, R. (2020). Applications of Machine Learning in Cyber Security - A Review and a Conceptual Framework for a University Setup. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., F. Tolba, M. (eds) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-030-14118-9_60

Download citation

Publish with us

Policies and ethics