Determining the Efficacy of Machine Learning Strategies in Quelling Cyber Security Threats: Evidence from Selected Literatures

Author:

Kodete Chandra Shikhi,Thuraka Bharadwaj,Pasupuleti Vikram,Malisetty Saiteja

Abstract

The alarming security threats in the internet world continually raise critical concerns among individuals, organizations and governments alike. The sophistication of cyber-attacks makes it imperative for a paradigm shift from traditional approaches and measures for quelling the attacks to modern sophisticated, digital and strategic ones, such as those involving machine learning and other technologies of artificial intelligence (AI). This study is aimed at examining machine learning (ML) strategies for effective cyber security. ML involves using algorithms and statistical models to enable computers learn from and make decisions or predictions based on data. The study relied on secondary data, which were subjected to a systematic review. The results of its thematic and qualitative analyses prove that majority of the literatures allude to the fact that the maximal performance abilities and tactics of the ML constitute its strategies for quelling cyber security. These include its: early detection of threats that are tackled before they cause damages; ability to analyze huge quantity of data quickly and accurately; and processing of datasets in real-time. The study argues that the noted abilities and tactics constitute ML strategies for quelling cyber security, regardless of its challenges like data quality, security vulnerabilities and possible incidences of bias. The study concludes that ML can indeed be used to detect and respond to threats in real-time, ascertain patterns of malicious behavior, and improve on internet security, which thereby prove it to be a viable tool for quelling cyber security.

Publisher

Sciencedomain International

Reference41 articles.

1. Azeez NA, Isekwene CC. Machine learning in cyber security operations. University of Ibadan Journal of Science and Logistics in ICT Research. 2024;11(2):57-70.

2. Njoku DO, Iwuchukwu VC, Jibiri JE, Ikwuazom CT, Ofoegbu CI, Nwokoma FO. Machine learning approach for fraud detection system in financial institution: A web base application. International Journal of Engineering Research and Development. 2024;20(4):01-121.

3. Okusi O. Cyber security techniques for detecting and preventing cross-site scripting attacks. World Journal of Innovation and Modern Technology. 2024;8(2):71-89. DOI: 10.56201/wjimt.v8.no2.2024

4. Bulama L, Shrivastava M. Framework & techniques to improve cyber security in Nigeria. Journal of Data Acquisition and Processing. 2023;38(2).

5. AL-Hawamleh AM. Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures. International Journal of Advanced Computer Science and Applications. 2023;14(2).

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Greenhouse Gas Emissions and the Challenges of Environmental Sustainability;African Journal of Environmental Sciences and Renewable Energy;2024-09-04

2. Achieving Housing Affordability in the U.S. through Sustained Use of AI and Robotic Process Automation for Prefabricated Modular Construction;African Journal of Advances in Science and Technology Research;2024-08-13

3. Leveraging Cost-Effective AI and Smart Technologies for Rapid Infrastructural Development in USA;African Journal of Advances in Science and Technology Research;2024-07-26

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3