LAPSE:2023.23124
Published Article

LAPSE:2023.23124
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
March 27, 2023
Abstract
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.
Record ID
Keywords
cybersecurity, intrusion detection system, Machine Learning, malware detection, spam classification
Subject
Suggested Citation
Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, Li J. Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity. (2023). LAPSE:2023.23124
Author Affiliations
Shaukat K: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia; Punjab University College of Information Technology, University of the Punjab, Lahore 54590, Pakistan [ORCID]
Luo S: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Varadharajan V: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Hameed IA: Department of ICT and Natural Sciences, Norwegian University of Science and Technology, 7491 Trondheim, Norway [ORCID]
Chen S: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Liu D: Data61, Commonwealth Scientific and Industrial Research Organization, Canberra 3169, Australia
Li J: Data61, Commonwealth Scientific and Industrial Research Organization, Canberra 3169, Australia
Luo S: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Varadharajan V: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Hameed IA: Department of ICT and Natural Sciences, Norwegian University of Science and Technology, 7491 Trondheim, Norway [ORCID]
Chen S: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Liu D: Data61, Commonwealth Scientific and Industrial Research Organization, Canberra 3169, Australia
Li J: Data61, Commonwealth Scientific and Industrial Research Organization, Canberra 3169, Australia
Journal Name
Energies
Volume
13
Issue
10
Article Number
E2509
Year
2020
Publication Date
2020-05-15
ISSN
1996-1073
Version Comments
Original Submission
Other Meta
PII: en13102509, Publication Type: Review
Record Map
Published Article

LAPSE:2023.23124
This Record
External Link

https://doi.org/10.3390/en13102509
Publisher Version
Download
Meta
Record Statistics
Record Views
265
Version History
[v1] (Original Submission)
Mar 27, 2023
Verified by curator on
Mar 27, 2023
This Version Number
v1
Citations
Most Recent
This Version
URL Here
https://psecommunity.org/LAPSE:2023.23124
Record Owner
Auto Uploader for LAPSE
Links to Related Works
