SlideShare a Scribd company logo
1 of 23
Download to read offline
The Contribution of
Machine Learning
in Cyber security
An Academic presentation by
Dr. Nancy Agnes, Head, Technical Operations, Phdassistance
Group www.phdassistance.com
Email: info@phdassistance.com
Today's Discussion
Introduction
Machine Learning in Malware Detection
Machine Learning in Phishing Detection
Beyond Detection: Additional Roles of
Machine Learning in Cybersecurity
The Future of Machine Learning in
Cybersecurity
Conclusion
Introduction
The benefits of artificial intelligence (AI) are
now broadly acknowledged as a result of
the increasing complexity of contemporary
information systems and the resulting ever-
increasing volume of big data.
Particularly with the emergence of deep
learning, machine learning (ML)
technologies are already being used to
address various real-world issues.
Machine translation, travel and holiday suggestions, object identification and monitoring, and
even varied applications in healthcare are fascinating examples of the practical successes of ML.
Additionally, ML is correctly regarded as a technology enabler due to the significant potential it
has demonstrated when used to autonomous vehicles or telecommunication networks (Zhang
et al., 2022).
Machine Learning, is a key technology for both present and future information systems, and it is
already used in many different fields. There is a huge gap between research and practise, but
the application of ML in cyber security is still in its infancy. As a result of the current state of the
art, which prevents recognising the function of ML in cyber security, this disagreement has its
origins there. Unless its benefits and drawbacks are recognised by a large audience, ML's full
potential will never be realised.
Two independent methods—misuse-based and anomaly-based—can be used
to detect cyber risks. The former, also known as signature- or rule-based, calls
for identifying particular "patterns" that relate to a given danger on the grounds
that subsequent threats will display the same patterns.
The latter call for developing a concept of "normality" and seek to identify
events deviating from it under the presumption that such deviations correlate
to security incidents. These two methods of detection work in conjunction with
one another: misuse-based approaches are very accurate but can only
identify known threats; anomaly-based approaches tend to raise more false
alarms but are more effective against new attacks (Elsisi et al., 2021).
The ability to use supervised or unsupervised ML algorithms is the distinctive
feature of ML applications for cyber risk detection (schematically represented
in Fig. 1).
The former can serve as full detection systems but calls for labelled data that
was developed under some degree of human oversight. The latter can only
carry out auxiliary jobs and do not have a human in the loop.
Labels may be simpler to obtain depending on the sort of data being analysed;
for example, any layperson can tell a valid website from a phishing website,
while it is more difficult to tell benign network traffic from malicious traffic.
Figure 1. Pros and Cons of Supervised and Unsupervised ML for Cyber Threat Detection.
Machine Learning in
Malware Detection
One of the most recognisable difficulties in cyber security is
the struggle against malware. Since malware only affects
one type of device, it can only be found by examining data
at the host level, or through HIDS.
Antivirus software can be viewed as a subset of HIDS, in
fact. A particular malware version is designed for a certain
operating system (OS).
For more than 20 years, malware has targeted Windows OS
the most due to its widespread use. Attackers are currently
focusing their efforts on mobile devices running operating
systems like Android (Annamalai, 2022).
Static or dynamic studies can both be used to detect malware. By only
examining a given file, the former seek to identify malware without running any
code.
The latter concentrate on examining a piece of software's behaviour while it is
being used, typically by setting it up in a controlled environment and keeping
an eye on its operations.
Both static and dynamic assessments are shown schematically in Fig. 2, can
acquire from ML.
Figure 2. Malware Detection via ML.
Static or dynamic studies can both be used to detect malware. By only
examining a given file, the former seek to identify malware without running any
code.
The latter concentrate on examining a piece of software's behaviour while it is
being used, typically by setting it up in a controlled environment and keeping
an eye on its operations.
Both static and dynamic assessments are shown schematically in Fig. 2, can
acquire from ML.
Machine Learning in Phishing
Detection
One of the most frequent ways to infiltrate a target network is by phishing, which is still a
serious danger to online security. Modern enterprises must prioritise the early identification of
phishing efforts, which can be tremendously helped by ML.
We specifically differentiate between two different uses of ML to detect phishing attempts:
detection of phishing sites, where the aim is to identify web pages that are disguised to look
like a legitimate website; and identification of phishing emails, which either point to a
vulnerable website or stimulate a response that includes sensitive information (Geetha &
Thilagam, 2021).
The primary distinction between these two methodologies is to the sort of data
being analysed: although it is typical to examine an email's text, header, or
attachments, it is more normal to study a webpage's URL, HTML code, or even visual
representations for websites. Such applications are depicted schematically in Fig. 3.
Figure 3. Phishing Detection via ML.
Beyond Detection:
Additional Roles of
Machine Learning in
Cybersecurity
There are numerous other functions in cyber security that ML can fill in addition to
threat detection.
Modern environments do indeed produce enormous amounts of data on a regular
basis, and these data may originate from a variety of sources, including ML models.
By using (extra) ML to analyse this data, it is possible to gain insights that raise the
security of digital systems. Researchers can group all these complementing ML jobs
into four tasks without losing generality: alert management, raw data analysis, risk
exposure assessment, and cyber threat intelligence (Hameed et al., 2021).
Schematic representation of machine learning and threat detection is given in Fig.
7.
Figure 7. Additional tasks that can be addressed via ML in cybersecurity
The Future of Machine
Learning in Cybersecurity
The state-of-the-art can be advanced in a countless number of
ways, including by improving current performance, reducing
known problems (such the inability to explain problems), and
creating new ML-based cyber security applications (like
integrating quantum computing).
6.1 Certification (Sovereign entities) - To ensure better
transparency and reliability, regulatory bodies must enforce the
development and adoption of standardized procedures that
certify the performance and robustness of ML systems.
Data Availability (executives and legislation authorities) - To address the shortage of adequate data,
companies should be more willing to share data originating in their environments, whereas
regulation authorities should promote such disclosure by defining proper policies and incentives.
Usable Security Research (scientific community) - The peer-review process should facilitate and
enforce the inclusion of the material for replicating ML experiments.
At the same time, such material should be evaluated to ensure its correctness potentially by a
separate set of reviewers with more technical expertise.
Orchestration of Machine Learning (engineers) - Orchestrating complex systems that use
(combinations of) ML and non-ML solutions is beneficial for cyber security.
Hence, ML engineers and practitioners should clearly highlight how to combine all such components
in order to maximize their practical effectiveness.
Conclusion
Information technology (IT) systems, including
autonomous ones that are also actively
exploited by hostile actors, are being used by
modern civilization more and more.
As a matter of fact, cyber threats are always
changing, in the coming future attackers will
have the means to seriously hurt or even kill
people.
Defensive mechanisms need to have the ability to quickly adapt to the changing settings and
dynamic threat landscape in order to prevent such incidents and reduce the myriad hazards that
can affect existing and future IT systems.
To establish the groundwork for a greater deployment of ML solutions to safeguard present and
future systems, this log aims to stimulate significant improvements of machine learning (ML) in the
field of cyber security.
GET IN TOUCH
+44 7537144372
UNITED KINGDOM
+91-9176966446
EMAIL
INDIA
info@phdassistance.com

More Related Content

More from PhD Assistance

7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfPhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxPhD Assistance
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfPhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxPhD Assistance
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfPhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxPhD Assistance
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfPhD Assistance
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...PhD Assistance
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...PhD Assistance
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfPhD Assistance
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...PhD Assistance
 
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfNLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfPhD Assistance
 
Quality of Service in Wireless Sensor Networks using Machine Learning.pdf
Quality of Service in Wireless Sensor Networks using Machine Learning.pdfQuality of Service in Wireless Sensor Networks using Machine Learning.pdf
Quality of Service in Wireless Sensor Networks using Machine Learning.pdfPhD Assistance
 
Machine Learning techniques in Academic Research – PhD Assistance.pdf
Machine Learning techniques in Academic Research – PhD Assistance.pdfMachine Learning techniques in Academic Research – PhD Assistance.pdf
Machine Learning techniques in Academic Research – PhD Assistance.pdfPhD Assistance
 
Manuscript writing help for Artificial Intelligence research – PhD Assistance...
Manuscript writing help for Artificial Intelligence research – PhD Assistance...Manuscript writing help for Artificial Intelligence research – PhD Assistance...
Manuscript writing help for Artificial Intelligence research – PhD Assistance...PhD Assistance
 
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...PhD Assistance
 
How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...
How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...
How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...PhD Assistance
 
Machine Learning Support in Supply Chain Management- Potential PhD Topics.pptx
Machine Learning Support in Supply Chain Management- Potential PhD Topics.pptxMachine Learning Support in Supply Chain Management- Potential PhD Topics.pptx
Machine Learning Support in Supply Chain Management- Potential PhD Topics.pptxPhD Assistance
 
writing Your Ph.D Research Paper UK | Phdassistance.pdf
writing Your Ph.D Research Paper UK | Phdassistance.pdfwriting Your Ph.D Research Paper UK | Phdassistance.pdf
writing Your Ph.D Research Paper UK | Phdassistance.pdfPhD Assistance
 

More from PhD Assistance (20)

7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Machine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdfMachine Learning Algorithm for Business Strategy.pdf
Machine Learning Algorithm for Business Strategy.pdf
 
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptxKey Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pptx
 
Key Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdfKey Factors Influencing Customer Purchasing Behavior.pdf
Key Factors Influencing Customer Purchasing Behavior.pdf
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptxFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
 
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdfFactors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
 
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptxImmigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
 
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdfImmigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
 
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
 
Selecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdfSelecting a Research Topic - Framework for Doctoral Students.pdf
Selecting a Research Topic - Framework for Doctoral Students.pdf
 
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...Identifying and Formulating the Research Problem in Food and Nutrition Study ...
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
 
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdfNLP based advanced method of detecting harmful videos - PhD Assistance.pdf
NLP based advanced method of detecting harmful videos - PhD Assistance.pdf
 
Quality of Service in Wireless Sensor Networks using Machine Learning.pdf
Quality of Service in Wireless Sensor Networks using Machine Learning.pdfQuality of Service in Wireless Sensor Networks using Machine Learning.pdf
Quality of Service in Wireless Sensor Networks using Machine Learning.pdf
 
Machine Learning techniques in Academic Research – PhD Assistance.pdf
Machine Learning techniques in Academic Research – PhD Assistance.pdfMachine Learning techniques in Academic Research – PhD Assistance.pdf
Machine Learning techniques in Academic Research – PhD Assistance.pdf
 
Manuscript writing help for Artificial Intelligence research – PhD Assistance...
Manuscript writing help for Artificial Intelligence research – PhD Assistance...Manuscript writing help for Artificial Intelligence research – PhD Assistance...
Manuscript writing help for Artificial Intelligence research – PhD Assistance...
 
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...
Artificial Intelligence Research Topics for PhD Manuscripts 2021 - PhD Assist...
 
How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...
How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...
How I Can Apply To Machine Learning To Predict Supply Chain Risks- Potential ...
 
Machine Learning Support in Supply Chain Management- Potential PhD Topics.pptx
Machine Learning Support in Supply Chain Management- Potential PhD Topics.pptxMachine Learning Support in Supply Chain Management- Potential PhD Topics.pptx
Machine Learning Support in Supply Chain Management- Potential PhD Topics.pptx
 
writing Your Ph.D Research Paper UK | Phdassistance.pdf
writing Your Ph.D Research Paper UK | Phdassistance.pdfwriting Your Ph.D Research Paper UK | Phdassistance.pdf
writing Your Ph.D Research Paper UK | Phdassistance.pdf
 

The Contribution of Machine Learning in Cyber security.pdf

  • 1. The Contribution of Machine Learning in Cyber security An Academic presentation by Dr. Nancy Agnes, Head, Technical Operations, Phdassistance Group www.phdassistance.com Email: info@phdassistance.com
  • 2. Today's Discussion Introduction Machine Learning in Malware Detection Machine Learning in Phishing Detection Beyond Detection: Additional Roles of Machine Learning in Cybersecurity The Future of Machine Learning in Cybersecurity Conclusion
  • 3. Introduction The benefits of artificial intelligence (AI) are now broadly acknowledged as a result of the increasing complexity of contemporary information systems and the resulting ever- increasing volume of big data. Particularly with the emergence of deep learning, machine learning (ML) technologies are already being used to address various real-world issues.
  • 4. Machine translation, travel and holiday suggestions, object identification and monitoring, and even varied applications in healthcare are fascinating examples of the practical successes of ML. Additionally, ML is correctly regarded as a technology enabler due to the significant potential it has demonstrated when used to autonomous vehicles or telecommunication networks (Zhang et al., 2022). Machine Learning, is a key technology for both present and future information systems, and it is already used in many different fields. There is a huge gap between research and practise, but the application of ML in cyber security is still in its infancy. As a result of the current state of the art, which prevents recognising the function of ML in cyber security, this disagreement has its origins there. Unless its benefits and drawbacks are recognised by a large audience, ML's full potential will never be realised.
  • 5. Two independent methods—misuse-based and anomaly-based—can be used to detect cyber risks. The former, also known as signature- or rule-based, calls for identifying particular "patterns" that relate to a given danger on the grounds that subsequent threats will display the same patterns. The latter call for developing a concept of "normality" and seek to identify events deviating from it under the presumption that such deviations correlate to security incidents. These two methods of detection work in conjunction with one another: misuse-based approaches are very accurate but can only identify known threats; anomaly-based approaches tend to raise more false alarms but are more effective against new attacks (Elsisi et al., 2021).
  • 6. The ability to use supervised or unsupervised ML algorithms is the distinctive feature of ML applications for cyber risk detection (schematically represented in Fig. 1). The former can serve as full detection systems but calls for labelled data that was developed under some degree of human oversight. The latter can only carry out auxiliary jobs and do not have a human in the loop. Labels may be simpler to obtain depending on the sort of data being analysed; for example, any layperson can tell a valid website from a phishing website, while it is more difficult to tell benign network traffic from malicious traffic.
  • 7. Figure 1. Pros and Cons of Supervised and Unsupervised ML for Cyber Threat Detection.
  • 8. Machine Learning in Malware Detection One of the most recognisable difficulties in cyber security is the struggle against malware. Since malware only affects one type of device, it can only be found by examining data at the host level, or through HIDS. Antivirus software can be viewed as a subset of HIDS, in fact. A particular malware version is designed for a certain operating system (OS). For more than 20 years, malware has targeted Windows OS the most due to its widespread use. Attackers are currently focusing their efforts on mobile devices running operating systems like Android (Annamalai, 2022).
  • 9. Static or dynamic studies can both be used to detect malware. By only examining a given file, the former seek to identify malware without running any code. The latter concentrate on examining a piece of software's behaviour while it is being used, typically by setting it up in a controlled environment and keeping an eye on its operations. Both static and dynamic assessments are shown schematically in Fig. 2, can acquire from ML.
  • 10. Figure 2. Malware Detection via ML.
  • 11. Static or dynamic studies can both be used to detect malware. By only examining a given file, the former seek to identify malware without running any code. The latter concentrate on examining a piece of software's behaviour while it is being used, typically by setting it up in a controlled environment and keeping an eye on its operations. Both static and dynamic assessments are shown schematically in Fig. 2, can acquire from ML.
  • 12. Machine Learning in Phishing Detection One of the most frequent ways to infiltrate a target network is by phishing, which is still a serious danger to online security. Modern enterprises must prioritise the early identification of phishing efforts, which can be tremendously helped by ML. We specifically differentiate between two different uses of ML to detect phishing attempts: detection of phishing sites, where the aim is to identify web pages that are disguised to look like a legitimate website; and identification of phishing emails, which either point to a vulnerable website or stimulate a response that includes sensitive information (Geetha & Thilagam, 2021).
  • 13. The primary distinction between these two methodologies is to the sort of data being analysed: although it is typical to examine an email's text, header, or attachments, it is more normal to study a webpage's URL, HTML code, or even visual representations for websites. Such applications are depicted schematically in Fig. 3.
  • 14. Figure 3. Phishing Detection via ML.
  • 15. Beyond Detection: Additional Roles of Machine Learning in Cybersecurity
  • 16. There are numerous other functions in cyber security that ML can fill in addition to threat detection. Modern environments do indeed produce enormous amounts of data on a regular basis, and these data may originate from a variety of sources, including ML models. By using (extra) ML to analyse this data, it is possible to gain insights that raise the security of digital systems. Researchers can group all these complementing ML jobs into four tasks without losing generality: alert management, raw data analysis, risk exposure assessment, and cyber threat intelligence (Hameed et al., 2021). Schematic representation of machine learning and threat detection is given in Fig. 7.
  • 17. Figure 7. Additional tasks that can be addressed via ML in cybersecurity
  • 18. The Future of Machine Learning in Cybersecurity The state-of-the-art can be advanced in a countless number of ways, including by improving current performance, reducing known problems (such the inability to explain problems), and creating new ML-based cyber security applications (like integrating quantum computing). 6.1 Certification (Sovereign entities) - To ensure better transparency and reliability, regulatory bodies must enforce the development and adoption of standardized procedures that certify the performance and robustness of ML systems.
  • 19. Data Availability (executives and legislation authorities) - To address the shortage of adequate data, companies should be more willing to share data originating in their environments, whereas regulation authorities should promote such disclosure by defining proper policies and incentives. Usable Security Research (scientific community) - The peer-review process should facilitate and enforce the inclusion of the material for replicating ML experiments. At the same time, such material should be evaluated to ensure its correctness potentially by a separate set of reviewers with more technical expertise.
  • 20. Orchestration of Machine Learning (engineers) - Orchestrating complex systems that use (combinations of) ML and non-ML solutions is beneficial for cyber security. Hence, ML engineers and practitioners should clearly highlight how to combine all such components in order to maximize their practical effectiveness.
  • 21. Conclusion Information technology (IT) systems, including autonomous ones that are also actively exploited by hostile actors, are being used by modern civilization more and more. As a matter of fact, cyber threats are always changing, in the coming future attackers will have the means to seriously hurt or even kill people.
  • 22. Defensive mechanisms need to have the ability to quickly adapt to the changing settings and dynamic threat landscape in order to prevent such incidents and reduce the myriad hazards that can affect existing and future IT systems. To establish the groundwork for a greater deployment of ML solutions to safeguard present and future systems, this log aims to stimulate significant improvements of machine learning (ML) in the field of cyber security.
  • 23. GET IN TOUCH +44 7537144372 UNITED KINGDOM +91-9176966446 EMAIL INDIA info@phdassistance.com