Machine Learning For Cybersecurity Threat Detectio
Machine Learning For Cybersecurity Threat Detectio
ISSN: 2321-3094
https://dirajournal.com
Original Article Refereed & Peer Reviewed Vol. 12, Issue: 01 | Jan – Mar 2024
Introduction
In an era that is characterised by the pervasive presence of digital technology, the field of
cybersecurity serves as an essential defence against the constantly shifting terrain of cyber
threats. Despite the fact that the growth of networked technologies, cloud computing, and the
Internet of Things (IoT) has brought about new levels of convenience and efficiency, it has also
made individuals and organisations vulnerable to a wide variety of threats. Traditional
approaches to cybersecurity, despite their importance, frequently struggle to keep up with the
level of sophistication and the volume of assaults that are occurring in the modern era. In
response to this unrelenting challenge, the incorporation of techniques that use machine
learning has emerged as a powerful ally in the fight to protect digital assets. The unstoppable
ascent of machine learning, which has been propelled by developments in computer power, the
availability of data, and inventions in algorithmic design, has liberated capabilities that are
1
This Article is published under CC BY 4.0 License and is available online in full Open Access on
https://urr.shodhsagar.com/
© Darpan International Research Analysis
transformative across a wide range of fields. Machine learning approaches provide a dynamic
way to augmenting standard security measures, which is a significant advancement in the field
of cybersecurity research. Through the utilisation of algorithms that are able to acquire
knowledge from data, professionals in the field of cybersecurity are able to acquire a set of
tools that are of great value in order to proactively protect networks, systems, and sensitive
information.
Review of literature
(Ijmtst, 2023) Studied “Machine Learning Approaches for Prediction and Prevention of Cyber
Attacks for Cyber Security” and discovered that the current rapid digitization will raise the cost
of data violations. Cyber hazards brought on by hackers and other online criminals usually lead
to a lack of data protection, which subsequently results in significant financial losses and a
negative image for the business. The quantity of cyberattacks on expanding businesses has
steadily increased over the last few years. It is impractical to use human analysis of cyber threat
discovery and support for cyber threat detection since it is costly, time-consuming, and error-
prone.
2
© Darpan International Research Analysis
© Darpan International Research Analysis
(Neelu Khare, 2020) Studied “Cybersecurity Threat Detection using Machine Learning and
Deep Learning Techniques and discovered that the Internet of Things (IoT) and Industry 4.0
have resulted in a significant increase in the number of internet-connected devices. This
presents a significant challenge for cybersecurity threat detection systems to effectively detect
all malicious programmes and events in the network. All forms of assaults, including fileless
malware, intrusion, botnet, and malware, are part of the changing threat landscape. To identify
malicious occurrences, a learning detection system must examine the program's behavioural
pattern. In this context, we have put forth models that leverage machine learning and deep
learning approaches to identify the harmful programmes and events within the system.
(Lee et al., 2019) Studies Cyber Threat Detection Based on Artificial Neural Networks Using
Event Profiles and discovered that one of the main issues with cybersecurity is the availability
of an automated method for detecting cyberthreats. In this paper, we describe an artificial neural
network-based cyberthreat detection method. The suggested solution improves cyberthreat
identification by converting a large number of gathered security events into unique event
profiles and applying a deep learning-based detection algorithm.
(Chukhnov & Ivanov, 2021) Studied Algorithms for Detecting and Preventing Attacks on
Machine Learning Models in Cyber-Security Problems Researchers discovered that machine
learning algorithms are susceptible to a variety of attacks meant to trick the systems into
making intentional mistakes. An overview of assault technologies on training datasets and
models with the intention of causing damaging (poisoning) effects is given in the article. Trials
have been conducted to apply the current assaults on different models. There has been
developed a comparative analysis of the cyber-resistance to damaging information acts of
several models, most commonly employed in operating systems. It is looked at whether the
several models that are most frequently applied to damaging information influences are stable.
In the event that up to 50% of the training data are contaminated, the models' stability is
demonstrated.
(Apruzzese et al., 2023) Studied The Role of Machine Learning in Cybersecurity and
discovered that The advantages of artificial intelligence (AI) are now widely acknowledged
due to the growing complexity of contemporary information systems and the ever-increasing
flow of massive data that results from them. In particular, machine learning (ML) techniques
are already being used to address a variety of real-world problems, particularly with the
introduction of deep learning. Machine translation, trip and holiday suggestions, object
detection and tracking, and even a number of uses in healthcare are intriguing instances of the
useful applications of machine learning. Furthermore, because machine learning has
3
© Darpan International Research Analysis
© Darpan International Research Analysis
5
© Darpan International Research Analysis
© Darpan International Research Analysis
• Feature Selection and Engineering: The selection of features, also known as input
variables, has a significant impact on the performance of the model. The process of
selecting and engineering features involves determining which data properties are the most
effective for a certain endeavour.
• Cross-Validation: In order to guarantee the generalizability of the results, cross-validation
techniques divide the dataset into training and testing subsets. This makes it possible to
conduct more thorough model evaluations..
• Evaluation Metrics: Metrics like as accuracy, recall, F1-score, and ROC-AUC are
extremely important in the field of cybersecurity since they aid in assessing the efficacy of
a model in identifying risks while simultaneously reducing the number of false positives.
• Overfitting and Regularization: An essential component of strong machine learning
models is the development of strategies to prevent overfitting, which occurs when machines
memorise training data rather than generalising.
• Ensemble Methods: Some examples of ensemble approaches include random forests and
gradient boosting. These techniques combine numerous models in order to increase the
accuracy and stability of predictions.
Conclusion
Organizations and people alike face a continuous struggle as a result of the constantly shifting
terrain of cyber threats. Despite the fact that traditional methods of cybersecurity are necessary,
they are becoming increasingly insufficient in the face of threats that are rapidly being
developed. The purpose of this study was to investigate the valuable contribution that machine
learning may make to the enhancement of cybersecurity efforts, with a particular emphasis on
threat detection, prevention, and response. Throughout the course of this voyage, we have
investigated the various applications of machine learning. These applications include anomaly
detection and signature-based detection, as well as behavioural analysis, predictive analytics,
and natural language processing. A remarkable level of precision, speed, and adaptability has
been proven by these applications in their capacity to identify and combat threats.
References
1. Apruzzese, G., Laskov, P., Montes De Oca, E., Mallouli, W., Brdalo Rapa, L.,
Grammatopoulos, A. V., & Di Franco, F. (2023). The Role of Machine Learning in
Cybersecurity. Digital Threats: Research and Practice, 4(1), 1–38.
6
© Darpan International Research Analysis
© Darpan International Research Analysis
https://doi.org/10.1145/3545574
2. Chukhnov, A. P., & Ivanov, Y. S. (2021). Algorithms for detecting and preventing attacks
on machine learning models in cyber-security problems. Journal of Physics: Conference
Series, 2096(1). https://doi.org/10.1088/1742-6596/2096/1/012099
3. Ijmtst, E. (2023). Machine Learning Approaches for Prediction and Prevention of Cyber
Attacks for Cyber Security. October. https://doi.org/10.46501/IJMTST0909015
4. Lee, J., Kim, J., Kim, I., & Han, K. (2019). Cyber Threat Detection Based on Artificial
Neural Networks Using Event Profiles. IEEE Access, 7, 165607–165626.
https://doi.org/10.1109/ACCESS.2019.2953095
5. Manjramkar, M. A., & Jondhale, K. C. (2023). Cyber Security Using Machine Learning
Techniques. Atlantis Press International BV. https://doi.org/10.2991/978-94-6463-136-
4_59
6. Neelu Khare, P. D. et. a. (2020). Cybersecurity Threat Detection using Machine Learning
and Deep Learning Techniques. In Proceedings of First International Conference on AI-
ML Systems (AI-ML Systems) (Vol. 1, Issue 1). Association for Computing Machinery.
https://www.mdpi.com/2079-9292/9/4/692/htm
7. Rana, P., & Patil, B. P. (2023). Cyber Security Threats Detection and Protection Using
Machine Learning Techniques in Iot. Journal of Theoretical and Applied Information
Technology, 101(7), 2526–2539.
8. Vadivelan, N., Bhargavi, K., Kodati, S., & Nalini, M. (2022). Detection of cyber attacks
using machine learning. AIP Conference Proceedings, 2405(07), 803–807.
https://doi.org/10.1063/5.0072724
7
© Darpan International Research Analysis