Technical Seminar: Sapthagiri College of Engineering
Technical Seminar: Sapthagiri College of Engineering
Technical Seminar
Presentation
on
“A Seminar on Machine Learning and Deep Learning Methods
for Cybersecurity”
With the development of the Internet ,cyber-attacks are changing rapidly and the
cybersecurity situation is not optimistic. This survey report describes key literature surveys
on machine learning (ML) and deep learning (DL) methods for network analysis of
intrusion detection and provides a brief tutorial description of each ML/DL method. Papers
representing each method were indexed, read, and summarized based on their temporal or
thermal correlations. Because data are so important in ML/DL methods, we describe some
of the commonly used network datasets used in ML/DL, discuss the challenges of using
ML/DL for cybersecurity and provide suggestions for research directions.
INTRODUCTION
• The objective of this paper is to explain how machine learning and deep
learning methods can be implemented in the cybersecurity.
• This paper explains the different types of network intrusions and their
detection by using different machine learning and deep learning methods.
• This paper explains about machine learning and deep learning methods
implemented over various datasets and their results.
APPLICATIONS
ALGORITHMS
• CONVOLUTION NEURAL NETWORK
• K-NEAREST NEIGHBOR
• K-MEANS CLUSTERING
• HIERARCHIAL CLUSTERING
• SUPPORT VECTOR MACHINE
• ARTIFICIAL NEURAL NETWORK
• DECISION TREE
• RECURRENT NEURAL NETWORK
• DEEP BELIEF NETWORK
CONVOLUTION NEURAL NETWORK
ALGORITHM
K-NEAREST NEIGHBOR ALGORITHM
K-MEANS CLUSTERING ALGORITHM
HIERARCHIAL CLUSTERING ALGORITHM
SUPPORT VECTOR MACHINE ALGORITHM
• Algorithm
DECISION TREE
ARTIFICIAL NEURAL NETWORK
RECURRENT NEURAL NETWORK
DEEP BELIEF NETWORK
RESULTS
CONCLUSION
The conclusion of the seminar is to highlight the machine learning and deep
learning methods used for the detection of various types of network
intrusion.
In the survey the comparison of the machine learning and deep learning
methods for cybersecurity over various datasets of is put forth.
REFERENCES