Team 1 Research: Application of Deep Machine Learning in Cybersecurity

Application of Deep Machine Learning in Cybersecurity

Sarana Tse, Niharika Kakumani, Savannah Muniz

Vahid Emamian2, Senior IEEE Member

1Computer Science Department

2Electrical Engineering Department

St. Mary’s University, San Antonio, TX

smuniz5@mail.stmarytx.edu

Abstract

The evolution of technology has brought in many changes across the globe. Technology has no limit to expand its scope, there are smart gadgets like Alexa, Google Home, Apple Pod and so on, to act like an assistant; there are smart homes, to control home appliances from far away places; and many more with the help of the Internet. The world is looking for a greater advancement in terms of science and technology. As the world is becoming digitalized and since technology is available to everyone, it is raising security challenges and an immediate need for robust techniques to combat various complex-cyber security-attacks. The attackers are improving their skills and coming up with new techniques to break through security infrastructures. The traditional cybersecurity tools are unable to defend, detect, and keep up with all attacks. Thus, cybersecurity is becoming overwhelmingly complex and sophisticated. There is a silver-lining in the implementation of cybersecurity with the help of deep machine learning to improve the attacks detection rates and to respond quickly to the attacks. This paper focuses on adoption of deep machine learning in cyber security. The first section gives an overview about various cyber threats, deep learning as a subset of machine learning, and artificial neural networks. The second section discusses various security goals to be achieved by the machine learning algorithms, followed by applications of machine learning in cybersecurity. The fourth section discusses three use cases to demonstrate how machine learning is applied in real-time scenarios to enhance the security. The final section summarizes the research paper.

Keywords – machine learning, cybersecurity, artificial neural networks,

Video:

 

Powerpoint:

Loader Loading...
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

Full Research Paper:

Loader Loading...
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

Leave a Reply

Your email address will not be published. Required fields are marked *