CFP last date
20 December 2024
Reseach Article

Adaptive Security Through Machine Learning with Predictive Approach to Modern Cyber Threats

by Satyanarayana Raju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 50
Year of Publication: 2024
Authors: Satyanarayana Raju
10.5120/ijca2024924185

Satyanarayana Raju . Adaptive Security Through Machine Learning with Predictive Approach to Modern Cyber Threats. International Journal of Computer Applications. 186, 50 ( Nov 2024), 6-12. DOI=10.5120/ijca2024924185

@article{ 10.5120/ijca2024924185,
author = { Satyanarayana Raju },
title = { Adaptive Security Through Machine Learning with Predictive Approach to Modern Cyber Threats },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2024 },
volume = { 186 },
number = { 50 },
month = { Nov },
year = { 2024 },
issn = { 0975-8887 },
pages = { 6-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number50/adaptive-security-through-machine-learning-with-predictive-approach-to-modern-cyber-threats/ },
doi = { 10.5120/ijca2024924185 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-11-27T00:39:39.471664+05:30
%A Satyanarayana Raju
%T Adaptive Security Through Machine Learning with Predictive Approach to Modern Cyber Threats
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 50
%P 6-12
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the modern world, where cyber threats are increasingly complex and frequent, traditional security methods often prove inadequate. Machine Learning (ML) offers a more proactive solution through the concept of predictive cybersecurity, which aims to prevent threats before they occur. This paper examines the role of ML in transforming threat management, emphasizing its ability to analyze large data volumes and identify early warning signs of security breaches. ML techniques, such as anomaly detection, malware classification, and behavior analysis, enhance the ability to detect and prevent threats in real-time. Additionally, the paper addresses the challenges of ML in cybersecurity, such as the need for large datasets, algorithmic biases, and the constantly evolving threat landscape. The potential for combining ML with other technologies, including artificial intelligence and big data, is also explored, highlighting how these integrations can strengthen cybersecurity defenses. Finally, the paper discusses the future of predictive cybersecurity, focusing on innovations like neural networks and autonomous systems that may revolutionize threat detection and response. By synthesizing insights from current literature and case studies, this work provides practical guidance for cybersecurity professionals in adopting ML solutions to mitigate evolving cyber risks.

References
  1. Cremer F, Sheehan B, Fortmann M, Kia AN, Mullins M, Murphy F, Materne S. Cyber risk and cybersecurity: a systematic review of data availability. Geneva Pap Risk Insur Issues Pract. 2022;47(3):698-736. doi: 10.1057/s41288-022-00266-6. Epub 2022 Feb 17. PMID: 35194352; PMCID: PMC8853293.
  2. P. L. Bokonda, K. Ouazzani-Touhami and N. Souissi, "Predictive analysis using machine learning: Review of trends and methods," 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Marrakech, Morocco, 2020, pp. 1-6,
  3. A. Yeboah-Ofori and C. Boachie, "Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning," 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), Accra, Ghana, 2019, pp. 66-73
  4. R. Das and T. H. Morris, "Machine Learning and Cyber Security," 2017 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, India, 2017, pp. 1-7
  5. Ekong, B. Ekong, A. Edet, “Supervised machine learning model for effective classification of patients with covid-19 symptoms based on bayesian belief network”, Researchers Journal of Science and Technology, vol2: pp. 27 – 33, 2022.
  6. A. B. Nassif, M. A. Talib, Q. Nasir and F. M. Dakalbab, "Machine Learning for Anomaly Detection: A Systematic Review," in IEEE Access, vol. 9, pp. 78658-78700, 2021
  7. T. T. Nguyen and V. J. Reddi, "Deep Reinforcement Learning for Cyber Security," in IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 8, pp. 3779-3795
  8. Ö. Aslan and A. A. Yilmaz, "A New Malware Classification Framework Based on Deep Learning Algorithms," in IEEE Access, vol. 9, pp. 87936-87951
  9. H. Wang, S. Mukhopadhyay, Y. Xiao and S. Fang, "An Interactive Approach to Bias Mitigation in Machine Learning," 2021 IEEE 20th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Banff, AB, Canada, 2021, pp. 199-205
  10. Satyanarayana Raju, Dorababu Nadella , "Enhancing Cloud Vulnerability Management Using Machine Learning: Advancing Data Privacy and Security in Modern Cloud Environments," International Journal of Computer Trends and Technology, vol. 72, no. 9, pp. 137-142
Index Terms

Computer Science
Information Sciences

Keywords

Machine Learning Predictive Cybersecurity Threat Management Anomaly Detection Malware Classification Artificial Intelligence Neural Networks