A Review on Cyber Security and Machine Learning: Advantages, Challenges

Authors

  • Navjot Singh Assistant Professor, Department of Electronics and Communication Engineering, Malout Institute of Management and Information Technology, Malout, Punjab, India
  • Deepika Jain Assistant Professor, Department of Electronics and Communication Engineering, Malout Institute of Management and Information Technology, Malout, Punjab, India

DOI:

https://doi.org/10.5281/zenodo.10897955

Keywords:

Cyber Security, Machine Learning, Internet of Things (IoT), Privacy, Security, Intrusion detection

Abstract

Machine learning is a subset of Computerized reasoning (simulated intelligence), which centers around the execution of certain frameworks that can gain from the verifiable information, recognize examples and pursue consistent choices with next to zero human intercessions. Network protection is the act of safeguarding advanced frameworks, like PCs, servers, cell phones, organizations and related information from vindictive assaults. Joining network protection and ML has two significant angles, to be specific representing network safety where the AI is applied, and the utilization of AI for empowering network protection. This joining can help us in different ways, similar to it gives upgraded security to the AI models, works on the exhibition of the network safety strategies, and supports compelling discovery of multi day assaults with less human mediation. In this review paper, we examine around two distinct ideas by joining digital protection and ML. We likewise examine the benefits, issues and difficulties of joining network safety and ML. Besides, we examine the different assaults and give an extensive near investigation of different procedures in two different thought about classes.

Downloads

Download data is not yet available.

Downloads

Published

30-03-2024

Issue

Section

Articles

How to Cite

[1]
N. Singh and D. Jain, “A Review on Cyber Security and Machine Learning: Advantages, Challenges”, IJRESM, vol. 7, no. 3, pp. 87–92, Mar. 2024, doi: 10.5281/zenodo.10897955.