SlideShare a Scribd company logo
An Overviewof Cyber
Security Data Science
from a Perspective of
Machine Learning
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Today
Discussion
Introduction
Machine learning tasks in cyber
security
Supervised learning
Unsupervised learning
Neural networks and deep
learning
Conclusion and future work
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Introduction
The information and communication technology (ICT)sector has
advanced significantly over the past fifty years and is now
pervasive and tightly intertwined with our contemporary society.
As a result, the security policymakers have recently shown a great
deal of worry over the protection of ICT applications and systems
from cyber-attacks.
Cyber security is currently a term used to describe the process of
defending ICT systems from multiple cyber threats or attacks.
The analysis of various cyber-attacks and the development of
defense techniques that preserve several qualities described as
below are the main issues with cyber security (Alhayani et al.,
2021).
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
01. 02.
Information access and disclosure
to unauthorized parties, systems, or
entities are prevented by the
confidentiality attribute.
Integrity is a quality that helps to
stop any unauthorized changes to
or deletions of data.
03.
A property called availability is
used to guarantee prompt and
dependable access to data assets
and systems for a designated
entity.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
The word "cyber security" refers to a range of situations,
including commercial and mobile computers, and can be
broken down into a number of standard categories.
These include information security, which primarily focuses on
the security and privacy of pertinent data, application security,
which considers keeping software and devices free of risks or
cyber-threats, network security, which primarily focuses on
protecting a computer system from cyber attackers or
intruders, and operational security, which also includes the
procedures for handling and protecting data assets.
Network security devices and computer security systems with
a firewall, antivirus programme, or intrusion detection system
make up typical cyber security systems.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Machine learning
tasks in cyber security
M achine learning (M L)is sometimes regarded as a subset of
"Artificial Intelligence," and it is strongly related to data science,
data mining, and computational statistics.
It focuses on teaching computers to recognize patterns from data.
Machine learning models, which could be crucial in the field of
cyber security, often consist of a collection of rules, techniques, or
intricate "transfer functions" that can be used to uncover
interesting data patterns or to recognize or anticipate behavior.
Here, we'll go through various approaches for handling machine
learning problems and how they relate to cyber security issues
(Assistance, 2022).
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
Supervised learning
When specified goals are established to achieve from a particular
set of inputs, or when using a task-driven approach, supervised
learning is carried out.
Regression and classification methods are the most widely used
supervised learning techniques in the field of machine learning.
These methods are frequently used to categorize or forecast the
future of a specific security issue.
For instance, classification methods can be utilized in the cyber
security field to forecast denial-of-service attacks (yes, no), or to
recognize various classes of malicious activities like scanning and
spoofing.
The well-known classification methods are ZeroR, OneR, Navies
Bayes, Decision Tree, K-nearest neighbors, Support Vector
Machines, Adaptive Boosting, and Logistic Regression.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Unsupervised learning
Finding patterns, frameworks, or knowledge in unlabeled data, or
using a data-driven strategy, are the main objective in
unsupervised learning problems.
Malware, a form of cyber-attack, hides itself in some ways,
changing its behavior constantly and autonomously to evade
detection.
Unsupervised learning methods like clustering can be used to
extract hidden structures and patterns from datasets to find clues
to such complex attacks.
Similar to this, clustering approaches can be helpful in locating
anomalies, finding and removing rules breaches, and noisy
examples in data. The well-liked hierarchical clustering techniques
employed in numerous application domains include single linkage
or complete linkages, K-means, and K-medoids.
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
Neural networks and
deep learning
Deep learning is a type of machine learning, a subset of artificial
intelligence that takes cues from biological neural networks seen
in the human brain.
The most widely used neural network algorithm is back
propagation, and artificial neural networks (ANN) are extensively
employed in deep learning (Aversano et al., 2021).
It executes learning on an input layer, one or more hidden layers,
and an output layer of a multi-layer feed-forward neural network.
Deep learning performs better as the volume of security data
increases, which is the primary distinction between it and
traditional machine learning.
Typically, deep learning algorithms work best with vast amounts
of data, whereas machine learning techniques work well with
smaller datasets.
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
Conclusion and future
work
The implementation of a strong framework that allows data-
driven decision making is the most crucial task for a smart cyber
security system (Assistance, 2021).
To make such a framework capable of minimizing these problems
and offering automated and intelligent security services,
enhanced data analytics based on machine learning approaches
must be taken into account.
As a result, developing a data-driven security model for a specific
security issue as well as related empirical evaluation to gauge the
model's efficacy and efficiency and determine its suitability for
use in actual application domains may be future works.
Further in order to develop a professional research proposal or
dissertation in cyber security applications kindly get in touch with
PhD assistance for a best and standard service.
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Copyright © 2022 PhdAssistance. All rights reserved
References
Alhayani, B., Jasim Mohammed, H., Zeghaiton Chaloob, I. & Saleh Ahmed, J. 2021. WITHDRAWN:
Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials
Today: Proceedings.
Assistance, P. 2021. Scope And Significance Of Data Science In Cybersecurity.
Assistance, P. 2022. The Contribution of Machine Learning in Cyber security.
Aversano, L., Bernardi, M.L., Cimitile, M. & Pecori, R. 2021. A systematic review on Deep Learning approaches
for IoT security. Computer Science Review. (40). pp. 100389.
Copyright © 2022 PhdAssistance. All rights reserved
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
ContactUs
UK: +44 7537144372
INDIA: +91-9176966446
info@phdassistance.com
Copyright © 2022 PhdAssistance. All rights reserved

More Related Content

Similar to An overview of cyber security data science from a perspective of machine learning.pptx

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IJCI JOURNAL
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
CSITiaesprime
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
sleeperharwell
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdf
BurhanNaeem1
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
guesta67d4a
 
Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique
Associate Professor in VSB Coimbatore
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
IJECEIAES
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
 
What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?
VRS Technologies
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
AIRCC Publishing Corporation
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
IJNSA Journal
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
Infosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
Infosectrain3
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
avinashkumar1912
 

Similar to An overview of cyber security data science from a perspective of machine learning.pptx (20)

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdf
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 

More from PhD Assistance

The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...
PhD Assistance
 
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxReferencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptx
PhD Assistance
 
Referencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfReferencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdf
PhD Assistance
 
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
PhD Assistance
 
Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...
PhD Assistance
 
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfQuantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdf
PhD Assistance
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
PhD Assistance
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
PhD Assistance
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
PhD Assistance
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdf
PhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptx
PhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdf
PhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
PhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
PhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
PhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
PhD Assistance
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
PhD Assistance
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdf
PhD Assistance
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
PhD Assistance
 
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfNLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
PhD Assistance
 

More from PhD Assistance (20)

The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...The relationship between clinical and biochemical findings with diabetic keto...
The relationship between clinical and biochemical findings with diabetic keto...
 
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptxReferencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pptx
 
Referencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdfReferencing an Article - Its styles and type.pdf
Referencing an Article - Its styles and type.pdf
 
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptxROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
 
Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...Current and future developments in cultural psychology of inequality in PhD r...
Current and future developments in cultural psychology of inequality in PhD r...
 
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdfQuantum Machine Learning is all you Need – PhD Assistance.pdf
Quantum Machine Learning is all you Need – PhD Assistance.pdf
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
 
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdf
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptx
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdf
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdf
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
 
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfNLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

An overview of cyber security data science from a perspective of machine learning.pptx

  • 1. An Overviewof Cyber Security Data Science from a Perspective of Machine Learning Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 2. Today Discussion Introduction Machine learning tasks in cyber security Supervised learning Unsupervised learning Neural networks and deep learning Conclusion and future work Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 3. Introduction The information and communication technology (ICT)sector has advanced significantly over the past fifty years and is now pervasive and tightly intertwined with our contemporary society. As a result, the security policymakers have recently shown a great deal of worry over the protection of ICT applications and systems from cyber-attacks. Cyber security is currently a term used to describe the process of defending ICT systems from multiple cyber threats or attacks. The analysis of various cyber-attacks and the development of defense techniques that preserve several qualities described as below are the main issues with cyber security (Alhayani et al., 2021). Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 4. 01. 02. Information access and disclosure to unauthorized parties, systems, or entities are prevented by the confidentiality attribute. Integrity is a quality that helps to stop any unauthorized changes to or deletions of data. 03. A property called availability is used to guarantee prompt and dependable access to data assets and systems for a designated entity. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 5. The word "cyber security" refers to a range of situations, including commercial and mobile computers, and can be broken down into a number of standard categories. These include information security, which primarily focuses on the security and privacy of pertinent data, application security, which considers keeping software and devices free of risks or cyber-threats, network security, which primarily focuses on protecting a computer system from cyber attackers or intruders, and operational security, which also includes the procedures for handling and protecting data assets. Network security devices and computer security systems with a firewall, antivirus programme, or intrusion detection system make up typical cyber security systems. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 6. Machine learning tasks in cyber security M achine learning (M L)is sometimes regarded as a subset of "Artificial Intelligence," and it is strongly related to data science, data mining, and computational statistics. It focuses on teaching computers to recognize patterns from data. Machine learning models, which could be crucial in the field of cyber security, often consist of a collection of rules, techniques, or intricate "transfer functions" that can be used to uncover interesting data patterns or to recognize or anticipate behavior. Here, we'll go through various approaches for handling machine learning problems and how they relate to cyber security issues (Assistance, 2022). Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 7. Supervised learning When specified goals are established to achieve from a particular set of inputs, or when using a task-driven approach, supervised learning is carried out. Regression and classification methods are the most widely used supervised learning techniques in the field of machine learning. These methods are frequently used to categorize or forecast the future of a specific security issue. For instance, classification methods can be utilized in the cyber security field to forecast denial-of-service attacks (yes, no), or to recognize various classes of malicious activities like scanning and spoofing. The well-known classification methods are ZeroR, OneR, Navies Bayes, Decision Tree, K-nearest neighbors, Support Vector Machines, Adaptive Boosting, and Logistic Regression. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 8. Unsupervised learning Finding patterns, frameworks, or knowledge in unlabeled data, or using a data-driven strategy, are the main objective in unsupervised learning problems. Malware, a form of cyber-attack, hides itself in some ways, changing its behavior constantly and autonomously to evade detection. Unsupervised learning methods like clustering can be used to extract hidden structures and patterns from datasets to find clues to such complex attacks. Similar to this, clustering approaches can be helpful in locating anomalies, finding and removing rules breaches, and noisy examples in data. The well-liked hierarchical clustering techniques employed in numerous application domains include single linkage or complete linkages, K-means, and K-medoids. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 9. Neural networks and deep learning Deep learning is a type of machine learning, a subset of artificial intelligence that takes cues from biological neural networks seen in the human brain. The most widely used neural network algorithm is back propagation, and artificial neural networks (ANN) are extensively employed in deep learning (Aversano et al., 2021). It executes learning on an input layer, one or more hidden layers, and an output layer of a multi-layer feed-forward neural network. Deep learning performs better as the volume of security data increases, which is the primary distinction between it and traditional machine learning. Typically, deep learning algorithms work best with vast amounts of data, whereas machine learning techniques work well with smaller datasets. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 10. Conclusion and future work The implementation of a strong framework that allows data- driven decision making is the most crucial task for a smart cyber security system (Assistance, 2021). To make such a framework capable of minimizing these problems and offering automated and intelligent security services, enhanced data analytics based on machine learning approaches must be taken into account. As a result, developing a data-driven security model for a specific security issue as well as related empirical evaluation to gauge the model's efficacy and efficiency and determine its suitability for use in actual application domains may be future works. Further in order to develop a professional research proposal or dissertation in cyber security applications kindly get in touch with PhD assistance for a best and standard service. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing Copyright © 2022 PhdAssistance. All rights reserved
  • 11. References Alhayani, B., Jasim Mohammed, H., Zeghaiton Chaloob, I. & Saleh Ahmed, J. 2021. WITHDRAWN: Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. Assistance, P. 2021. Scope And Significance Of Data Science In Cybersecurity. Assistance, P. 2022. The Contribution of Machine Learning in Cyber security. Aversano, L., Bernardi, M.L., Cimitile, M. & Pecori, R. 2021. A systematic review on Deep Learning approaches for IoT security. Computer Science Review. (40). pp. 100389. Copyright © 2022 PhdAssistance. All rights reserved Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing
  • 12. Journal support | Dissertation support | Analysis | Data collection | Coding & Algorithms | Editing & Peer- Reviewing ContactUs UK: +44 7537144372 INDIA: +91-9176966446 info@phdassistance.com Copyright © 2022 PhdAssistance. All rights reserved