TY - CHAP
T1 - Comparative Analysis of Machine and Deep Learning for Cyber Security
AU - Maryam, Hafsa
AU - Zukhraf, Syeda Zillay Nain
AU - Ullah, Rehmat
N1 - Publisher Copyright:
© 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors.
PY - 2024/1/16
Y1 - 2024/1/16
N2 - Cyber crime is a growing problem that exploits various vulnerabilities in computing environments due to the widespread Internet applications, Internet-connected systems, and the large volume and diversity of data, making it more vulnerable to continued and automated cyber attacks. Research academia, ethical hackers, and industry are focusing on identifying vulnerabilities and recommending mitigation strategies. Traditional cyber security strategies are no longer effective in detecting new attacks, and technological advancements allow attackers to develop sophisticated attack strategies that evade current security systems. As a result, there is a growing need for advanced technologies and effective techniques to combat emerging cyber threats. To address this, machine learning (ML) and deep learning (DL) techniques have emerged as critical tools in enhancing cyber security. However, ML and DL techniques easily detect cyber crime and abnormal data packets. This chapter presents comprehensive study about ML and DL techniques to detect possible cyber attacks. However, ML and DL models are quite efficient to identify cyber threats. More interestingly, this research study is having limitations related to ML and DL techniques, which can be utilized for IDS, spam, malware, and fake page detection. Also, comprehensive comparative analysis is performed using ML and DL to provide solutions regarding cyber security. Finally, the chapter discusses the future trends of ML and DL for cyber security.
AB - Cyber crime is a growing problem that exploits various vulnerabilities in computing environments due to the widespread Internet applications, Internet-connected systems, and the large volume and diversity of data, making it more vulnerable to continued and automated cyber attacks. Research academia, ethical hackers, and industry are focusing on identifying vulnerabilities and recommending mitigation strategies. Traditional cyber security strategies are no longer effective in detecting new attacks, and technological advancements allow attackers to develop sophisticated attack strategies that evade current security systems. As a result, there is a growing need for advanced technologies and effective techniques to combat emerging cyber threats. To address this, machine learning (ML) and deep learning (DL) techniques have emerged as critical tools in enhancing cyber security. However, ML and DL techniques easily detect cyber crime and abnormal data packets. This chapter presents comprehensive study about ML and DL techniques to detect possible cyber attacks. However, ML and DL models are quite efficient to identify cyber threats. More interestingly, this research study is having limitations related to ML and DL techniques, which can be utilized for IDS, spam, malware, and fake page detection. Also, comprehensive comparative analysis is performed using ML and DL to provide solutions regarding cyber security. Finally, the chapter discusses the future trends of ML and DL for cyber security.
UR - http://www.scopus.com/inward/record.url?scp=85179217701&partnerID=8YFLogxK
U2 - 10.1201/9781003404361-3
DO - 10.1201/9781003404361-3
M3 - Chapter
AN - SCOPUS:85179217701
SN - 9781032518992
SP - 39
EP - 69
BT - Cyber Security for Next-Generation Computing Technologies
PB - CRC Press
ER -