IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Uluslararası Bilişim Kongresi
  • IIC 2022 FULL PAPERS
  • APPLICATION OF MACHINE LEARNING METHODS IN CYBERSECURITY

APPLICATION OF MACHINE LEARNING METHODS IN CYBERSECURITY

Authors : Mesut Güven
Pages : 1-9
View : 39 | Download : 23
Publication Date : 2022-04-28
Abstract :Internet grid and computer networks have already transformed the way we live. Today, governments and commercial firms deployed their services to internet. As a result, we use internet- connected devices in every aspect of life. Since modern life is intertwined with computers and connected devices, maintaining the security of internet is very important and considered as a strategic infrastructure. To maintain the stable and integral operation of cyber assets, many cybersecurity tools and products have been developed and commercially available. Most of those cybersecurity products make use of machine learning because classical signature-based methods are unable to detect zero-day attacks or slightly deformed versions of known attacks. Moreover, machine learning algorithms can also be trained to detect abnormal network traffic. In this work, we explain how machine learning, deep learning, and transfer learning methods are being used in cybersecurity. Traditional machine learning algorithms such as support vector machines, decision trees, etc., have been implemented to well-known cybersecurity datasets for detecting intrusion attacks and deep neural networks have been implemented to malware analysis. Another popular implementation of deep learning is to use models that were trained on large image datasets in a transfer learning paradigm. In these models, malware binaries are converted to images and pre-trained networks are fed with those images. The performance of the pre- trained models is very promising, and they can detect malware software with high accuracy.
Keywords : Cybersecurity, Machine Learning, Deep Learning, Deep Transfer Learning, Malware Detection

ORIGINAL PAPER URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025