SLR Cybersecurity ML
SLR Cybersecurity ML
Keywords
Cybersecurity, Network Attacks, Machine Learning, Intrusion Detection, Adversarial ML.
1. Introduction
Network security has become a critical concern with the rise of complex cyber threats.
Machine learning has emerged as a potent approach for detecting anomalies, identifying
intrusions, and mitigating network attacks. ML models can automatically adapt to evolving
threats and uncover patterns that traditional rule-based systems might miss. This
systematic literature review (SLR) aims to synthesize the current state-of-the-art in
applying ML to network security.
2. Methodology
Research Questions:
- RQ1: What machine learning techniques are commonly used for network attack detection?
- RQ3: What are the main challenges and limitations in this field?
Search Strategy:
- Databases: IEEE Xplore, ScienceDirect, SpringerLink, ACM Digital Library.
Inclusion Criteria:
Exclusion Criteria:
- Non-English papers.
Quality Assessment:
Data Extraction:
3. Results
Overview of Selected Studies:
Evaluation Metrics:
4. Discussion
Strengths and Limitations:
5. Conclusion
Machine learning offers promising solutions for network attack detection and mitigation,
with deep learning methods achieving state-of-the-art results. However, practical
deployment still faces challenges like adversarial attacks, real-time processing needs, and
dataset biases. Future research must focus on enhancing robustness and real-world
applicability.
References
- Abdullah et al. (2024). https://doi.org/10.31272/JEASD.28.3.4