Title: Machine learning models for enhancing cyber security

Authors: P.R. Therasa; M. Shanmuganathan; B.R. Tapas Bapu; N. Sankarram

Addresses: Department of Computer Science and Engineering, R.M.K. Engineering College, Chennai, India ' Department of Computer Science and Engineering, Panimalar Engineering College, Chennai-600123, Tamil Nadu, India ' Department of Electronics and Communication Engineering, S.A. Engineering College, Chennai, Tamil Nadu, India ' Department of Information Technology, KGISL Institute of Technology, Tamil Nadu 641035, India

Abstract: Because networks are having an ever-increasing impact on contemporary life, cybersecurity has become an increasingly essential area of research. Virus protection, firewalls, intrusion detection systems, and other related technologies are the primary focus of most cybersecurity strategies. These methods defend networks against assaults from both within and outside the organisation. The ever-increasing complexity of deep learning as well as machine learning-based technologies has been applied in the detection and prevention of possible threats. The objective of this research is to investigate and expand upon the applications of machine learning techniques within the context of the topic of cybersecurity. We offer accessible a multi-layered system that is built on machine learning with the intention of modelling cybersecurity. This will be our key area of focus as we work toward achieving our goal of guiding the application toward data-driven, intelligent decision-making for the aim of protecting systems from being attacked by cybercriminals.

Keywords: cyberattack; security modelling; intrusion prevention; intelligence on cyber threats; cybersecurity; learning techniques; data science; and determination making.

DOI: 10.1504/IJESDF.2024.140742

International Journal of Electronic Security and Digital Forensics, 2024 Vol.16 No.5, pp.590 - 601

Received: 07 Oct 2022
Accepted: 27 Feb 2023

Published online: 02 Sep 2024 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article