The Role of Machine Learning in Cyber-Security
DOI:
https://doi.org/10.64322/JLRP.2025.1105Keywords:
Machine Learning, Cyber-security, Cyber-attack, Challenges, Risk MitigationAbstract
The present defense system lacks combating force to deal with the cyber threats that have been getting more technically developed and creativity in committing of the crime. Machine learning (ML) technology, which is another aspect of artificial intelligence, has been a firm player in abetting the commission of crime. The best thing about machine learning is that it does not require much human surveillance and can analyze large databases and give solutions. Despite the odds of machine learning, this can also be useful in combating cyber-crime. This paper carefully looks at the different aspects of machine learning (ML) that can be used in providing cybersecurity. Machine learning can be used in detecting advanced threats, analyzing complex malware, viruses, anticipating cyberthreats and monitor human behaviour for forecasting or otherwise which is complex, naturally unpredictable and does not have any straight cut jacket formula. It also critically examines the challenges encountered by machine learning like biasness, vulnerability towards cyber-attack and ethical challenges. On perusing the recent case studies, it reveals how machine learning has changed the modern day cybersecurity dimensions. The paper emphasizes the need for collaborative, interdisciplinary initiatives to mitigate the risks linked to machine learning deployment and to ensure its responsible and ethical application.
Downloads
References
1. Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331. https://doi.org/10.1016/j.patcog.2018.07.023
2. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502
3. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy (pp. 305–316). IEEE. https://doi.org/10.1109/SP.2010.25
4. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418
5. Zhang, Y., Li, W., & Shen, J. (2019). A multilayer perceptron-based intrusion detection system for Internet of Things. IEEE Access, 7, 110064–110073. https://doi.org/10.1109/ACCESS.2019.2932197