MACHINE LEARNING TECHNIQUES FOR CYBER SECURITY

dc.AffiliationOctober University for modern sciences and Arts MSA
dc.contributor.authorSur, Soumik
dc.contributor.authorEl-Dosuk, Mohamed
dc.contributor.authorKamel, Sherif
dc.date.accessioned2024-04-24T08:35:57Z
dc.date.available2024-04-24T08:35:57Z
dc.date.issued2024-04
dc.description.abstractMachine learning (ML) is a branch of artificial intelligence (AI) that focuses on developing computer programs that can recognize patterns in historical data, learn from it, and make logical judgements with little to no human input. Protecting digital systems, such as computers, servers, mobile devices, networks, and related data against hostile assaults is known as cyber security. Two key components of combining cyber security with ML are accounting for cyber security where machine learning is used and using machine learning to enable cyber security. This coming together may benefit us in a number of ways, including by enhancing the security of machine learning models, enhancing the effectiveness of cyber security techniques, and supporting the efficient detection of zero day attacks with minimal human interaction. The cyber security landscape has grown more complicated due to the quick development of technology, creating a number of difficulties for protecting sensitive data and important infrastructures. This project's objective is to implement three different systems using machine learning in cyber security. The first system investigates how reinforcement learning may be used to improve cyber security measures. Reinforcement learning algorithms are taught to make the best choices based on their interactions with the environment through trial and error, which can be useful in adjusting to changing cyberthreats. The second approach focuses on malware identification since evasive and polymorphic malware have proven difficult to identify using standard signature-based methods. Several machine learning and deep learning approaches are used in this effort to accurately identify and categorize dangerous software. The third solution uses machine learning and deep learning techniques to address the crucial problem of network intrusion detection. The performance of each system's machine learning models will be evaluated throughout the project using a variety of datasets alongside evaluation measures.en_US
dc.description.urihttps://www.scimagojr.com/journalsearch.php?q=19700182903&tip=sid&clean=0
dc.identifier.issn19928645
dc.identifier.urihttp://repository.msa.edu.eg/xmlui/handle/123456789/5945
dc.language.isoenen_US
dc.publisherLittle Lion Scientificen_US
dc.relation.ispartofseriesJournal of Theoretical and Applied Information Technology;Volume 102, Issue 7, Pages 3002 - 301415 April 2024
dc.subjectAttack; Cyber security; Deep learning; Machine learning; Networken_US
dc.titleMACHINE LEARNING TECHNIQUES FOR CYBER SECURITYen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
IMG-20231214-WA0000.jpg
Size:
16.8 KB
Format:
Joint Photographic Experts Group/JPEG File Interchange Format (JFIF)
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
51 B
Format:
Item-specific license agreed upon to submission
Description: