Machine Learning and Deep Learning
Machine Learning and Deep Learning
Abstract— In past decade machine learning (ML) and deep Protection of networks, computer connected devices,
learning (DL), has generated irresistible research interest and programs, and data from malicious attacks or unauthorized
attracted unprecedented public attention. With the increasing access using set of technologies is known as cyber security.
integration of the Internet and social life, there is change in Cyber security can be commonly referred as information
how people learn and work, but it also exposes them to serious
technology security. Information can be sensitive
security threats. It is a challenging task to protect sensitive
information, data, network and computers connected systems information, or other types of data for which unauthorized
from the unauthorized cyberattacks. For this purpose, effective access leads to disaster. In the process of synchronizing with
cyber security is required. Recent technologies such as machine new upcoming technologies, security trends and threat
learning and deep learning are integrated with cyberattacks to intelligence cyber security are at high risk. However, it is
provide solution to this problem. The paper surveys machine essential to protect information and data from cyberattacks,
learning and deep learning in cyber security also it discusses to maintain cyber security.
the challenges and opportunities of using ML / DL and
provides suggestions for research directions. A. Challenges of cybersecurity
There are many challenges in the field of cyber security.
Keywords- Cyber security, Machine learning, Deep learning,
Intrusion detection.
One of the most challenging elements of cybersecurity is the
changing nature of security threats. Traditionally protecting
I. INTRODUCTION the biggest known threats and not protecting systems against
less dangerous risks was approach against maintaining cyber
Presently system connected by internet, such as the security.
hardware, software & data can be protected from cyberattacks Key challenges of cyber security are:
by means of cyber security. Cybersecurity is a set of
technologies and processes designed to protect computers,
networks, programs and data from attacks and unauthorized
access, alteration, or destruction. As threats become more Application security Information security
sophisticated the most recent technologies such as Machine
learning (ML) and deep learning (DL) are used in the
Key challanges
cybersecurity community to leverage security abilities. of cyber
Nowadays, cyber security is a stimulating issue in the cyber security
space and it has been depending on computerization of different
application domains such as finances, industry, medical, and Disater security Network security
many other important areas [11]. To identify various network
attacks, particularly not previously seen attacks, is a key issue
to be solved urgently [1].
This paper deals with previous work in machine learning (ML) Fig.1. Areas covered in cyber security
and deep learning (DL) methods for cybersecurity applications
and some applications of each method in cyber security • Application security: To protect applications from
operations are described. The ML and DL methods covered in threats come from faults in the application design,
this paper are applicable to detect cyber security threats such as development, deployment, upgrade or maintenance
hackers and predators, spyware, phishing and network intrusion through actions that are taken during the development
detection in ML/DL. Thus, great prominence is placed on a life-cycle is known as application security. Some basic
thorough description of the ML/DL methods, and references to methods used for application security are:
seminal works for each ML and DL method are provided [1]. 1. Input parameter validation.
And discuss the challenges and opportunities of using ML / DL
2. User/Role Authentication & Authorization.
for cybersecurity.
3. Session management, parameter manipulation &
The rest of the survey is organized as follows:
exception management.
Section II tells about cyber security, Section III is composed
of Machine learning, Section IV contains survey on Deep • Information security: It protects information from
learning and Section V dedicated to similarities and unauthorized access to save privacy. Methods used are:
differences between Machine learning & Deep learning. 1. Identification, authentication & authorization of
user.
II. CYBER SECURITY 2. Cryptography.
Trojan Phishing Paper presented by Fraley and Dr. Cannady gives better
understanding of how machine learning could be leveraged
to classify various security events and alerts. They
developed model to react to security events by alerting
Social
Viruses Enginee SMEs, alerting analysts or producing reports depending
ring upon the severity of the security event. Additional support
for cyber defense was discussed to further reduce the time
demand for responding to critical security events [3].
Spyware
/ adware
Worms Merat et al. presented different types of computer processes
that can be mapped in multitasking environment for the
improvement of machine learning. SHOWAN model
developed by them was used to learn the cyber awareness
Fig.2. Types of cyber threats behavior of a computer process against multiple concurrent
threads [4]. The examined process starts to outperform, and
tended to manage numerous tasks poorly, but it gradually
learned to acquire and control tasks, in the context of
• Type of activity that involves an attacker hacking anomaly detection. Finally, SHOWAN plots the abnormal
system files through encryption and demanding a activities of manually projected task and compare with
payment to decrypt is known as Ransomware. loading trends of other tasks within the group.
• Malware is any file or program used to harm a
computer user, such as worms, computer viruses, In the article, an overview of applying machine learning to
Trojan horses and spyware. address challenges in emerging vehicular networks was
• Worms are like viruses in that they are self-replicating presented by Ye et al. This paper introduced basics of
• An attack that relies on human interaction to trick users machine learning, including major categories and
for breaking security to gain sensitive is Social representative algorithms in brief. Some preliminary
engineering. examples of applying machine learning in vehicular
• A virus is a piece of malicious code that is loaded onto a networks to ease data-driven decision making using
machine without the user’s knowledge. It spread to other reinforcement learning was published [5]. Some open issues
computers by attaching itself to another computer file. for further research also highlighted in this paper.
• Spyware/adware can be installed on computer without
knowledge of user when attachments is opened or A systematic of the challenges associated with machine
clicked or downloaded it infects the software and learning in the context of big data and categorization based on
collects personal information. the V dimensions of big data was published by L’Heureux