A REVIEW ON THE IMPACT OF MACHINERY LEARNING IN CYBER PROTECTION AND THE MEASUREMENT OF ITS SERVICES OVER THE RISK IDENTIFICATION
DOI:
https://doi.org/10.48047/yarsyx03Keywords:
Talents, Artificial intelligence, Understanding Vulnerabilities, Managing Knowledge.Abstract
This paper delves into the revolutionary consequences of ML for cybersecurity, specifically regarding its function beyond the conventional threat detection. Traditional approaches struggle to keep up with the dynamic nature of cyber threats. Machine learning has the potential to greatly improve cybersecurity procedures by analysing large amounts of data and identifying trends. Several fields, such as automated response, threat prediction, and anomaly detection, might benefit from the ML approaches discussed in this work. The study delves into how ML models can analyse historical attack patterns and spot minor warning signs of upcoming attacks that people may miss. Additional applications of ML in real-time reaction systems are discussed in the paper. These systems have the potential to adapt to emerging threats by continuously learning from fresh data. The article explains that ML can do more than only detect and respond; it can also automate mundane security chores, improve threat intelligence, and maximize resource allocation. By integrating ML into cybersecurity frameworks, organizations might potentially achieve security postures that are more proactive and adaptable. This includes methods like ML-based behavioural analysis, which may shed light on user actions and highlight suspicious patterns that may indicate security holes. The final component of the paper delves further into how machine learning may transform cybersecurity practices. It goes beyond threat detection to show how technology may provide new ways to manage security in general, as well as in prediction and reaction. These results have the potential to open up new avenues for ML studies and applications, which may eventually result in safer and more flexible cyber defences.
Downloads
References
Ahmadi, M., & Abolhasani, S. (2019). Deep Learning in Cybersecurity: A Survey. IEEE Access, 7, 4763- 4782.
Chukhnov, A. P., & Ivanov, Y. S. (2021). Algorithms for detecting and preventing attacks on machine learning models in cyber-security problems. Journal of Physics: Conference Series, 2096(1).
E. Alpaydin, Introduction to machine learning. MIT press, 2020.
Eslam Amer and Ivan Zelinka. 2020. A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence. Comput. Secur. 92 (2020), 101760.
Giuseppina Andresini, Feargus Pendlebury, Fabio Pierazzi, Corrado Loglisci, Annalisa Appice, and Lorenzo Cavallaro. 2021. INSOMNIA: Towards concept-drift robustness in network intrusion detection. In Proceedings of the ACM CCS Workshop on Artificial Intelligence and Security.
Ijmtst, E. (2023). Machine Learning Approaches for Prediction and Prevention of Cyber Attacks for Cyber Security. October.
Lee, J., Kim, J., Kim, I., & Han, K. (2019). Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access, 7, 165607–165626.
Muna Al-Hawawreh and Elena Sitnikova. 2019. Leveraging deep learning models for ransomware detection in the industrial Internet of Things environment. In Proceedings of the IEEE Military Communications and Information Systems Conference.1–6.
Neelu Khare, P. D. et. a. (2020). Cybersecurity Threat Detection using Machine Learning and Deep Learning Techniques. In Proceedings of First International Conference on AIML Systems (AI-ML Systems) (Vol. 1, Issue 1). Association for Computing Machinery.
Somasundaram, S., & Sowmiya, C. (2020). Machine Learning-Based Intrusion Detection Systems: A Comprehensive Survey. Journal of Network and Computer Applications, 168, 102742.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
