SlideShare a Scribd company logo
1 of 12
An Overviewof Cyber
Security Data Science
from a Perspective of
Machine Learning
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Today
Discussion
Introduction
Machine learning tasks in cyber
security
Supervised learning
Unsupervised learning
Neural networks and deep
learning
Conclusion and future work
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Introduction
The information and communication technology (ICT)sector has
advanced significantly over the past fifty years and is now
pervasive and tightly intertwined with our contemporary society.
As a result, the security policymakers have recently shown a great
deal of worry over the protection of ICT applications and systems
from cyber-attacks.
Cyber security is currently a term used to describe the process of
defending ICT systems from multiple cyber threats or attacks.
The analysis of various cyber-attacks and the development of
defense techniques that preserve several qualities described as
below are the main issues with cyber security (Alhayani et al.,
2021).
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
01. 02.
Information access and disclosure
to unauthorized parties, systems, or
entities are prevented by the
confidentiality attribute.
Integrity is a quality that helps to
stop any unauthorized changes to
or deletions of data.
03.
A property called availability is
used to guarantee prompt and
dependable access to data assets
and systems for a designated
entity.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
The word "cyber security" refers to a range of situations,
including commercial and mobile computers, and can be
broken down into a number of standard categories.
These include information security, which primarily focuses on
the security and privacy of pertinent data, application security,
which considers keeping software and devices free of risks or
cyber-threats, network security, which primarily focuses on
protecting a computer system from cyber attackers or
intruders, and operational security, which also includes the
procedures for handling and protecting data assets.
Network security devices and computer security systems with
a firewall, antivirus programme, or intrusion detection system
make up typical cyber security systems.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Machine learning
tasks in cyber security
M achine learning (M L)is sometimes regarded as a subset of
"Artificial Intelligence," and it is strongly related to data science,
data mining, and computational statistics.
It focuses on teaching computers to recognize patterns from data.
Machine learning models, which could be crucial in the field of
cyber security, often consist of a collection of rules, techniques, or
intricate "transfer functions" that can be used to uncover
interesting data patterns or to recognize or anticipate behavior.
Here, we'll go through various approaches for handling machine
learning problems and how they relate to cyber security issues
(Assistance, 2022).
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
Supervised learning
When specified goals are established to achieve from a particular
set of inputs, or when using a task-driven approach, supervised
learning is carried out.
Regression and classification methods are the most widely used
supervised learning techniques in the field of machine learning.
These methods are frequently used to categorize or forecast the
future of a specific security issue.
For instance, classification methods can be utilized in the cyber
security field to forecast denial-of-service attacks (yes, no), or to
recognize various classes of malicious activities like scanning and
spoofing.
The well-known classification methods are ZeroR, OneR, Navies
Bayes, Decision Tree, K-nearest neighbors, Support Vector
Machines, Adaptive Boosting, and Logistic Regression.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Unsupervised learning
Finding patterns, frameworks, or knowledge in unlabeled data, or
using a data-driven strategy, are the main objective in
unsupervised learning problems.
Malware, a form of cyber-attack, hides itself in some ways,
changing its behavior constantly and autonomously to evade
detection.
Unsupervised learning methods like clustering can be used to
extract hidden structures and patterns from datasets to find clues
to such complex attacks.
Similar to this, clustering approaches can be helpful in locating
anomalies, finding and removing rules breaches, and noisy
examples in data. The well-liked hierarchical clustering techniques
employed in numerous application domains include single linkage
or complete linkages, K-means, and K-medoids.
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
Neural networks and
deep learning
Deep learning is a type of machine learning, a subset of artificial
intelligence that takes cues from biological neural networks seen
in the human brain.
The most widely used neural network algorithm is back
propagation, and artificial neural networks (ANN) are extensively
employed in deep learning (Aversano et al., 2021).
It executes learning on an input layer, one or more hidden layers,
and an output layer of a multi-layer feed-forward neural network.
Deep learning performs better as the volume of security data
increases, which is the primary distinction between it and
traditional machine learning.
Typically, deep learning algorithms work best with vast amounts
of data, whereas machine learning techniques work well with
smaller datasets.
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
Conclusion and future
work
The implementation of a strong framework that allows data-
driven decision making is the most crucial task for a smart cyber
security system (Assistance, 2021).
To make such a framework capable of minimizing these problems
and offering automated and intelligent security services,
enhanced data analytics based on machine learning approaches
must be taken into account.
As a result, developing a data-driven security model for a specific
security issue as well as related empirical evaluation to gauge the
model's efficacy and efficiency and determine its suitability for
use in actual application domains may be future works.
Further in order to develop a professional research proposal or
dissertation in cyber security applications kindly get in touch with
PhD assistance for a best and standard service.
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
References
Alhayani, B., Jasim Mohammed, H., Zeghaiton Chaloob, I. & Saleh Ahmed, J. 2021. WITHDRAWN:
Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials
Today: Proceedings.
Assistance, P. 2021. Scope And Significance Of Data Science In Cybersecurity.
Assistance, P. 2022. The Contribution of Machine Learning in Cyber security.
Aversano, L., Bernardi, M.L., Cimitile, M. & Pecori, R. 2021. A systematic review on Deep Learning approaches
for IoT security. Computer Science Review. (40). pp. 100389.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
ContactUs
UK: +44 7537144372
INDIA: +91-9176966446
info@phdassistance.com
Copyright © 2022 PhdAssistance. All rights reserved

More Related Content

Similar to An overview of cyber security data science from a perspective of machine learning.pptx

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfBurhanNaeem1
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...IJNSA Journal
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can ChantellPantoja184
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber securityavinashkumar1912
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
 

Similar to An overview of cyber security data science from a perspective of machine learning.pptx (20)

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdf
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
 

More from PhD Assistance

The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...PhD Assistance
 
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxReferencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxPhD Assistance
 
Referencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfReferencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfPhD Assistance
 
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxPhD Assistance
 
Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...PhD Assistance
 
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfQuantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfPhD Assistance
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...PhD Assistance
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...PhD Assistance
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfPhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxPhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfPhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxPhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfPhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxPhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfPhD Assistance
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...PhD Assistance
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfPhD Assistance
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...PhD Assistance
 
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfNLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfPhD Assistance
 

More from PhD Assistance (20)

The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...
 
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxReferencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptx
 
Referencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfReferencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdf
 
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
 
Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...
 
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfQuantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdf
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdf
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptx
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdf
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdf
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
 
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfNLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

An overview of cyber security data science from a perspective of machine learning.pptx

  • 1. An Overviewof Cyber Security Data Science from a Perspective of Machine Learning Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 2. Today Discussion Introduction Machine learning tasks in cyber security Supervised learning Unsupervised learning Neural networks and deep learning Conclusion and future work Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 3. Introduction The information and communication technology (ICT)sector has advanced significantly over the past fifty years and is now pervasive and tightly intertwined with our contemporary society. As a result, the security policymakers have recently shown a great deal of worry over the protection of ICT applications and systems from cyber-attacks. Cyber security is currently a term used to describe the process of defending ICT systems from multiple cyber threats or attacks. The analysis of various cyber-attacks and the development of defense techniques that preserve several qualities described as below are the main issues with cyber security (Alhayani et al., 2021). Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 4. 01. 02. Information access and disclosure to unauthorized parties, systems, or entities are prevented by the confidentiality attribute. Integrity is a quality that helps to stop any unauthorized changes to or deletions of data. 03. A property called availability is used to guarantee prompt and dependable access to data assets and systems for a designated entity. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 5. The word "cyber security" refers to a range of situations, including commercial and mobile computers, and can be broken down into a number of standard categories. These include information security, which primarily focuses on the security and privacy of pertinent data, application security, which considers keeping software and devices free of risks or cyber-threats, network security, which primarily focuses on protecting a computer system from cyber attackers or intruders, and operational security, which also includes the procedures for handling and protecting data assets. Network security devices and computer security systems with a firewall, antivirus programme, or intrusion detection system make up typical cyber security systems. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 6. Machine learning tasks in cyber security M achine learning (M L)is sometimes regarded as a subset of "Artificial Intelligence," and it is strongly related to data science, data mining, and computational statistics. It focuses on teaching computers to recognize patterns from data. Machine learning models, which could be crucial in the field of cyber security, often consist of a collection of rules, techniques, or intricate "transfer functions" that can be used to uncover interesting data patterns or to recognize or anticipate behavior. Here, we'll go through various approaches for handling machine learning problems and how they relate to cyber security issues (Assistance, 2022). Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 7. Supervised learning When specified goals are established to achieve from a particular set of inputs, or when using a task-driven approach, supervised learning is carried out. Regression and classification methods are the most widely used supervised learning techniques in the field of machine learning. These methods are frequently used to categorize or forecast the future of a specific security issue. For instance, classification methods can be utilized in the cyber security field to forecast denial-of-service attacks (yes, no), or to recognize various classes of malicious activities like scanning and spoofing. The well-known classification methods are ZeroR, OneR, Navies Bayes, Decision Tree, K-nearest neighbors, Support Vector Machines, Adaptive Boosting, and Logistic Regression. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 8. Unsupervised learning Finding patterns, frameworks, or knowledge in unlabeled data, or using a data-driven strategy, are the main objective in unsupervised learning problems. Malware, a form of cyber-attack, hides itself in some ways, changing its behavior constantly and autonomously to evade detection. Unsupervised learning methods like clustering can be used to extract hidden structures and patterns from datasets to find clues to such complex attacks. Similar to this, clustering approaches can be helpful in locating anomalies, finding and removing rules breaches, and noisy examples in data. The well-liked hierarchical clustering techniques employed in numerous application domains include single linkage or complete linkages, K-means, and K-medoids. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 9. Neural networks and deep learning Deep learning is a type of machine learning, a subset of artificial intelligence that takes cues from biological neural networks seen in the human brain. The most widely used neural network algorithm is back propagation, and artificial neural networks (ANN) are extensively employed in deep learning (Aversano et al., 2021). It executes learning on an input layer, one or more hidden layers, and an output layer of a multi-layer feed-forward neural network. Deep learning performs better as the volume of security data increases, which is the primary distinction between it and traditional machine learning. Typically, deep learning algorithms work best with vast amounts of data, whereas machine learning techniques work well with smaller datasets. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 10. Conclusion and future work The implementation of a strong framework that allows data- driven decision making is the most crucial task for a smart cyber security system (Assistance, 2021). To make such a framework capable of minimizing these problems and offering automated and intelligent security services, enhanced data analytics based on machine learning approaches must be taken into account. As a result, developing a data-driven security model for a specific security issue as well as related empirical evaluation to gauge the model's efficacy and efficiency and determine its suitability for use in actual application domains may be future works. Further in order to develop a professional research proposal or dissertation in cyber security applications kindly get in touch with PhD assistance for a best and standard service. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 11. References Alhayani, B., Jasim Mohammed, H., Zeghaiton Chaloob, I. & Saleh Ahmed, J. 2021. WITHDRAWN: Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. Assistance, P. 2021. Scope And Significance Of Data Science In Cybersecurity. Assistance, P. 2022. The Contribution of Machine Learning in Cyber security. Aversano, L., Bernardi, M.L., Cimitile, M. & Pecori, R. 2021. A systematic review on Deep Learning approaches for IoT security. Computer Science Review. (40). pp. 100389. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 12. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing ContactUs UK: +44 7537144372 INDIA: +91-9176966446 info@phdassistance.com Copyright © 2022 PhdAssistance. All rights reserved