Analysts at ABI Research estimate that machine learning in cybersecurity will boost spending in big data, artificial intelligence (AI) and analytics to $96 billion by 2021, while some of the world’s technology giants are already taking a stand to better protect their own customers.
Machine learning has become a vital technology for cybersecurity. Machine learning preemptively stamps out cyber threats and bolsters security infrastructure through pattern detection, real-time cyber crime mapping and thorough penetration testing.
Close zero-day vulnerabilities
detect malicious activity like ransomware and stop attacks
Automate repetitive security tasks
Empower BYOD mobile devices against security threats
Real time analysis is needed many times. For example, zero day attack needs analysis of real time traffic
Prediction of attacks based on temporal data (time series data) is important task.
Refer this paper for the detail
Packet level data
Flow level data
Connection level data - For example, VPN session data
Host level data - For example Endpoint protection platforms (EPP) which resides in the BYOD devices
Refer here for detail of interesting security parameters
It's a tool in the toolkit. Over-reliance on AI in cybersecurity can create a false sense of safety. That's why, in addition to judiciously applied algorithms, cybersecurity experts, data scientists and psychologists are crucial
https://www.mdsny.com/5-top-machine-learning-use-cases-for-security/
https://builtin.com/artificial-intelligence/machine-learning-cybersecurity
https://images.app.goo.gl/dmXX7emTrFTD4pip6
https://images.app.goo.gl/HEkAH9CDg5u7jv3A7
https://images.app.goo.gl/ZrpRGCueCB2DZrCN8
https://www.linkedin.com/posts/dpkumar_anomalydetection-cybersecurity-machinelearningmodels-activity-6767977267718184960-5xbh
https://images.app.goo.gl/NHvRv7cTmHbNk2HQ6
https://embracethered.com/blog/posts/2020/red-teaming-and-monte-carlo-simulations/
https://journalofbigdata.springeropen.com/articles/10.1186/s40537-020-00318-5
https://dzone.com/articles/positive-impact-of-graph-technology-and-neural-net
https://arxiv.org/pdf/1812.01661.pdf
https://www.semanticscholar.org/paper/DeepDefense%3A-Identifying-DDoS-Attack-via-Deep-Yuan-Li/2550d4f922f9652c4755695c822e492161524bce
https://colab.research.google.com/drive/1D4z6kRAnSqJ4X21kMxMF2QWlpylmDmVQ?usp=sharing
https://colab.research.google.com/drive/1D4z6kRAnSqJ4X21kMxMF2QWlpylmDmVQ?usp=sharing