The Role of Machine Learning in Cyber-Security

Authors

  • Bhagaban Paul Heritage Institute of Technology Author

DOI:

https://doi.org/10.64322/JLRP.2025.1105

Keywords:

Machine Learning, Cyber-security, Cyber-attack, Challenges, Risk Mitigation

Abstract

The present defense system lacks combating force to deal with the cyber threats that have been getting more technically developed and creativity in committing of the crime. Machine learning (ML) technology, which is another aspect of artificial intelligence, has been a firm player in abetting the commission of crime. The best thing about machine learning is that it does not require much human surveillance and can analyze large databases and give solutions. Despite the odds of machine learning, this can also be useful in combating cyber-crime. This paper carefully looks at the different aspects of machine learning (ML) that can be used in providing cybersecurity. Machine learning can be used in detecting advanced threats, analyzing complex malware, viruses, anticipating cyberthreats and monitor human behaviour for forecasting or otherwise which is complex, naturally unpredictable and does not have any straight cut jacket formula. It also critically examines the challenges encountered by machine learning like biasness, vulnerability towards cyber-attack and ethical challenges. On perusing the recent case studies, it reveals how machine learning has changed the modern day cybersecurity dimensions. The paper emphasizes the need for collaborative, interdisciplinary initiatives to mitigate the risks linked to machine learning deployment and to ensure its responsible and ethical application.

Downloads

Download data is not yet available.

Author Biography

  • Bhagaban Paul, Heritage Institute of Technology

    B.Tech (CSE)

References

1. Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331. https://doi.org/10.1016/j.patcog.2018.07.023

2. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502

3. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy (pp. 305–316). IEEE. https://doi.org/10.1109/SP.2010.25

4. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418

5. Zhang, Y., Li, W., & Shen, J. (2019). A multilayer perceptron-based intrusion detection system for Internet of Things. IEEE Access, 7, 110064–110073. https://doi.org/10.1109/ACCESS.2019.2932197

Downloads

Published

2025-06-29

How to Cite

1.
Paul B. The Role of Machine Learning in Cyber-Security. jlrp [Internet]. 2025 Jun. 29 [cited 2025 Jul. 16];1(1):33-40. Available from: https://www.jlrp.in/index.php/jlrp/article/view/20

Share