Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020, International Journal for Research in Applied Science and Engineering Technology IJRASET
In recent times, most of the data such as books, personal materials and genetic information digitally. This transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this lead to the development of securing the cyberspace and protecting against cybercrime. As more people started using cyberspace, more number of cybercrime were registered. As the number of crime increases, we are in need of help from Machine Learning. Machine Learning in the field of Cyber forensics, is a boon. In this paper we have an overview of Machine Learning in the field of Cyber Forensics and various method of it implementation. I. INTRODUCTION 1) Deep Learning and Machine Learning: The field of Artificial Intelligence and Machine Learning has been around since a long time but it is now that we have enough computational power to effectively develop strong artificial neural networks (ANN) in a reasonable time frame with the help of strong hardware and software support. The most important aspect of Cyber security involves protecting key data and devices from cyber threats. It's an important part of corporations that collect and maintain large databases of client data, social platforms wherever personal information were submitted and also the government organizations wherever secret, political and defence information comes into measure. Unlike the traditional machine learning algorithm that uses feature engineering and illustration ways. They will chose the best options by themselves. 2) Cyber Security: Cyber security is that the set of framework and processes designed to protect computers, networks, programs, and data from attack, unauthorized access, change, or destruction. These frameworks are consist of network security and host security systems, every of those has a minimum firewall, antivirus computer code, associated an intrusion detection system. 3) Deep Learning and Cyber Security: This survey summarizes the association of cyber security and Deep learning techniques (DL). Deep learning technique are being used by researchers in recent days. Deep learning can be used alongside the prevailing automation ways like rule and heuristics based and machine learning techniques. This survey helps is understand the benefits of deep learning algorithms to classify and tackle malicious activities that perceived from the varied sources like DNS, email, URLs etc. In recent days, non-public firms and public establishments are dealing with constant and complicated cyber threats and cyberattacks. As a precaution, organizations should build and develop a cybersecurity culture and awareness so as to defend against cyber criminals. 4) Shared Task: In this shared task conference, the train data set will be distributed among the participants and the train model will be evaluated based on the test data set. This is most common in NLP area recently shared task on identifying phishing email has been organized by. The details of the submitted runs are available throughout. Followed by shared task on detecting malicious domain organized intruders. These two shared tasks enables the participants to share their approach through working notes or system description paper. Each year there is one more shared task conducted by CDMC. But they don't provide us an option to submit system description papers. But recently they are giving an option to submit system description papers (CDMC 2018). One significant issue was that the available data sets are very old and each data set has their own limitations. The main issue we face now is due to the non-maintenance of Cybercrime data. To overcome such issues a brief investigative issue made to understand the need of Security domain, datasets and key feature of data sciences is discussed in for problems employing the data science towards cyber security. The need for such dataset in to be promoted.
International Journal of Data Science and Big Data Analytics
Necessity of data science for enhanced Cybersecurity2021 •
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To understand and analyze the actual phenomena with data, various scientific methods, machine learning techniques, processes, and systems are used, which is commonly known as data science. In this paper, I have briefly described the data science its evolution its applications in cloud security and how cybersecurity data science came in existence what kind of advantages are given by Cybersecurity Data Science (CSDS) and its steps like, where the data is being gathered from relevant cybersecurity sources, and the analytics complement the latest data-driven patterns for providing more effective security solutions. The concept of cybersecurity data science allows making the computing process more actionable and intelligent as compared to traditional ones in the domain of cybersecurity. After that I have described the various upcoming challenges that can emerge after the frequent applications of CSDS, how machine learning and deep learning are applicable in it and types of algorithms that can be applicable in it. So, the overall paper is not only focuses on the origins of Data Science but it also describes its modern uses for the relevant cybersecurity field and data driven intelligent decision making system can protect our system from known and unknown cyber attacks.
isara solutions
Machine learning to identify Potential Cyber Security threats First author --Preeti JainCyber crime is proliferating everywhere exploiting every kind of vulnerability to computing environment. Ethical Hackers pay more attention towards assessing vulnerabilities and recommending mitigation methodologies. The development of effective techniques has been an urgent demand in the field of the cybersecurity community. Machine Learning for cybersecurity has become an issue of great importance recently due to th e effectiveness of machine learning and deep learning in cybersecurity issues. Machine learning techniques have been applied for ma jor challenges in cybersecurity issues like intrusion detection, malware classification and detection, spam detection and phishing detection. Although machin e learning cannot automate a complete cybersecurity system, it helps to identify cyber-security threats more efficiently than other softwareoriented methodologies, and thus reduces the burden on security analysts. Ever evolving nature of cyber threats throws challenges continuously on the researchers to e xplore with the ideal combination of deep expertise in cybersecurity and in data science. In this paper, we present the current state of art machine learning applications and their potential for cybersecurity. An analysis of machine learning algorithms for most common types of cybersecurity threats is presented. In a computing context, cybersecurity is going through gigantic movements in innovation and its tasks as of late, and information science is driving the change. Extricating security occurrence examples or experiences from cybersecurity information and building relating information driven model, is the way to make a security framework mechanized and smart. To comprehend and examine the genuine marvels with information, different logical strategies, AI methods, cycles, and frameworks are utilized, which is ordinarily known as information science. In this paper, we zero in and quickly talk about on cybersecurity information science, where the information is being assembled from important cybersecurity sources, and the investigation supplement the most recent information driven examples for giving more powerful security arrangements. The idea of cybersecurity information science permits making the computing cycle more significant and shrewd when contrasted with conventional ones in the area of cybersecurity. We at that point examine and sum up various related examination issues and future bearings. Moreover, we give an AI based multi-layered structure with the end goal of cybersecurity demonstrating. Generally speaking, our objective isn't just to talk about cybersecurity information science and important techniques yet in addition to center the relevance towards information driven savvy dynamic for shielding the frameworks from digital assaults.
The investigation of learning in antagonistic situations is a developing control at the point between Deep learning and PC security. The enthusiasm for learning-based strategies for security-and framework plan applications originates from the high level of intricacy of marvels fundamental the security and dependability of PC frameworks. As it turns out to be progressively troublesome to achieve the craved properties exclusively utilizing statically planned components, learning strategies are being utilized increasingly to acquire a superior comprehension of different information gathered from these perplexing frameworks. In any case, learning methodologies can be dodged by enemies, who change their conduct because of the learning strategies. To-date, there has been constrained research into learning methods that are strong to assaults with provable strength ensures. The Perspectives Workshop, "Deep Learning Methods for Computer Security" was convened to unite intrigued scientists from both the PC security and Deep learning groups to talk about systems, difficulties, and future research bearings for secure learning and learning-based security applications. As an aftereffect of the twenty-two welcomed presentations, workgroup sessions and casual examination, a few need ranges of research were distinguished. The open issues recognized in the field extended from customary utilizations of Deep learning in security, for example, assault location and investigation of pernicious programming, to methodological issues identified with secure learning, particularly the improvement of new formal methodologies with provable security ensures. At last various other potential applications were pinpointed outside of the conventional extent of PC security in which security issues may likewise emerge in association with information driven strategies. Cases of such applications are web-based social networking spam, literary theft discovery, initiation recognizable proof, copyright implementation, PC vision (especially in the setting of biometrics), and estimation investigation.
2020 •
Whether we realize it or not, machine learning touches our daily lives in many ways. When you upload a picture on social media, for example, you might be prompted to tag other people in the photo. That’s called image recognition, a machine learning capability by which the computer learns to identify facial features. Other examples include number and voice recognition applications. From an intrusion detection perspective, analysts can apply machine learning, data mining and pattern recognition algorithms to distinguish between normal and malicious traffic. One way that a computer can learn is by examples. With the advances in information technology (IT) criminals are using cyberspace to commit numerous cybercrimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures; hence, there is a need for more sophisticated cyber defense systems that need to ...
International Journal for Research in Applied Science and Engineering Technology (IJRASET)
Understanding Deep Learning Architecture to Various Problems of Cyber Security2021 •
Traditional machine learning has evolved into deep learning. It's capable of extracting the best feature representation from raw input samples. Intrusion detection, malware classification, Android malware detection, spam and phishing detection, and binary analysis are just a few examples of how this has been used in cyber security. Deep auto encoders, limited Boltzmann machines, recurrent neural networks, generative adversarial networks, and other DL methods are all described in this study in a brief tutorial-style method. After that, we'll go over how each of the DL methods is employed in security applications.
Periodicals of Engineering and Natural Sciences (PEN)
Reviewing the effectiveness of artificial intelligence techniques against cyber security risks2020 •
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a crucial research discipline. Over the areas, the advancement in information technology has enabled cybercriminals to launch increasingly sophisticated attacks that can endanger cybersecurity. Due to this, traditional cybersecurity solutions have become ineffective against emerging cyberattacks. However, the advent of Artificial Intelligence (AI) – particularly Machine Learning (ML) and Deep Learning (DL) – and cryptographic techniques have shown promising results in countering the evolving cyber threats caused by adversaries. Therefore, in this study, AI's potential in enhancing cybersecurity solutions is discussed. Additionally, the study has provided an in-depth analysis of different AI-based techniques that can detect, analyse, and prevent cyber threats. In the end, the present study has also discussed future research opportunities that are linked with the development of AI systems...
The current year has seen unprecedented amount of hacker/ransomware attacks on government as well as private enterprises spread all across the world. Shadow Brokers came in form this year by leaking alleged NSA tools, which included a Windows exploit known as EternalBlue. In May, WannaCry ransomware crippled hundreds of thousands of computers belonging to public utilities, large corporations, and private citizens. It also affected National Health Service hospitals and facilities in the United Kingdom. It was halted in its tracks by utilising its flaws and activating a kill switch. WannaCry rode on Shadow Brokers leak of Windows OS weakness EternalBlue and the fact that the Windows MS17-010 patch had not been updated on many machines by the users. In June, Petya (also known as NotPetya/ Nyetya/Goldeneye) infected machines worldwide. It is suspected that its main target was to carry out a cyber-attack on Ukraine. It hit various utility services in Ukraine including the central bank, power companies, airports, and public transportation1. In 2009, Conficker2 worm had infected civil and defence establishments of many nations, for example, the UK DOD had reported large-scale infection of its major computer systems including ships, submarines, and establishments of Royal Navy. The French Naval computer network 'Intramar' was infected, the network had to be quarantined, and air operations suspended. The German Army also reported infection of over a hundred of its computers. Conficker sought out flaws in Windows OS software and propagated by forming a botnet, it was very difficult to weed it out because it used a combination of many advanced malware techniques. It became the largest known computer worm infection by afflicting millions of computers in over 190 countries. It is evident from the above incidents, which have the capability to inflict damage to both military and public institutions, that the amount of data and the speeds at which processing is required in case of cyber defence is beyond the capacity of human beings. Conventional algorithms are also unable to tackle dynamically changing data during a cyber-attack. Therefore, there is an increasing opinion that effective cyber defence can only be provided by real time flexible Artificial Intelligence (AI) systems with learning capability. The US Defence Science Board report of 20133 states that " in a perfect world, DOD operational systems would be able to tell a commander when and if they were compromised, whether the system is still usable in full or degraded mode, identify alternatives to aid the commander in completing the mission, and finally provide the ability to restore the system to a known, trusted state. Today's technology does not allow that level of fidelity and understanding of systems. " The report brings out that, systems such as automated intrusion detection, automated patch management, status data from each network, and regular network audits are currently unavailable. As far as cyber defence in military is concerned, in the US, it is the responsibility of the Cyber Command to " protect, monitor, analyze, detect, and respond to unauthorized activity within DOD information systems and computer networks " 4. The offensive cyber operations could involve both military and intelligence agencies since both computer network exploitation and computer network attacks are involved. The commander of Cyber Command is also the Director of National Security Agency, thus enabling the Cyber Command to execute computer exploitations that may result in physical destruction of military or civilian infrastructure of the adversary. AI utilizes a large number of concepts like, Machine Learning, Fuzzy Logic Control Systems, and Artificial Neural Networks (ANNs), etc. each of which singly or in combination are theoretically amenable for designing an efficient cyber-defence systems. The designed AI cyber defence system should proficiently monitor the network in real time and must be aware
INSTRUMENTATION ENGINEERING, ELECTRONICS AND TELECOMMUNICATIONS – 2021 (IEET-2021): Proceedings of the VII International Forum
A review on cyber securitySemiconductor Science and Information Devices
Cybersecurity and Cyber Forensics: Machine Learning Approach2020 •
We live in a connected world of digital devices which include mobile devices, workstations, control systems, transportation systems, base stations, satellites of different interconnected networks, Global positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses software and predefined techniques which is aim at extracting evidences from any form of digital device and can be presented to a court of law for criminal and/or civil proceedings provided that it satisfy this three conditions; comprehensiveness, authenticity and objectivity. Cyber space is recently considered a domain worth exploring and investigating and securing after lithosphere, hydrosphere, biosphere and atmosphere. Cyber threats, attacks and breaches have become a normal incident in day-to-day life of internet users. However, it is noted that cybersecurity is based on confiden...
Archaeological and Anthropological Sciences
Agricultural systems in Bangladesh: the first archaeobotanical results from Early Historic Wari-Bateshwar and Early Medieval Vikrampura2020 •
2006 •
Habitat International
Urban expansion and vegetation dynamics: The role of protected areas in preventing vegetation loss in a growing mega city2024 •
2020 •
Meet Single Women in Delhi 9153335777 Call Girls In Delhi Watsap Single Female
Meet Single Women in Delhi 9153335777 Call Girls In Delhi Watsap Single Female