IDEAS home Printed from https://ideas.repec.org/a/ajp/edwast/v8y2024i6p4291-4307id2930.html
   My bibliography  Save this article

Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions

Author

Listed:
  • Mohammad Rakibul Islam Bhuiyan
  • Mahfujur Rahman Faraji
  • Mst. Nowshin Tabassum
  • Provakar Ghose
  • Sukanta Sarbabidya
  • Riva Akter

Abstract

This study aims to explore the application of machine learning (ML) in enhancing cybersecurity measures, focusing specifically on intrusion detection, malware detection, fraud detection, and anomaly detection systems. A systematic review of 743 scholarly papers was conducted, from which 115 were selected for in-depth analysis. The review process involved evaluating advancements in ML techniques within the context of cybersecurity. The findings reveal that ML-driven systems significantly enhance the automation of security processes, improve the recognition of novel threats, and reduce human error in cyber threat management. However, challenges such as adversarial attacks and the need for high-quality model training pose significant barriers to the broader adoption of ML in cybersecurity. The study discusses the implications of these findings, emphasizing the necessity for developing robust and adaptive ML models that can withstand adversarial threats while improving integration across various cybersecurity applications. The insights gained from this research provide a comprehensive overview of the potential benefits and challenges of implementing ML in cybersecurity, highlighting the need for continuous innovation in threat detection mechanisms. This review acknowledges limitations such as the predominance of literature from Western contexts, potentially overlooking insights from other regions. Furthermore, the complexity of implementing ML systems in dynamic cyber environments remains a critical challenge. Future research should concentrate on refining ML algorithms to enhance resilience against adversarial threats, exploring the integration of emerging technologies for improved cybersecurity, and addressing gaps in the existing literature regarding the life cycle of ML models in real-world applications.

Suggested Citation

  • Mohammad Rakibul Islam Bhuiyan & Mahfujur Rahman Faraji & Mst. Nowshin Tabassum & Provakar Ghose & Sukanta Sarbabidya & Riva Akter, 2024. "Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions," Edelweiss Applied Science and Technology, Learning Gate, vol. 8(6), pages 4291-4307.
  • Handle: RePEc:ajp:edwast:v:8:y:2024:i:6:p:4291-4307:id:2930
    as

    Download full text from publisher

    File URL: https://learning-gate.com/index.php/2576-8484/article/view/2930/1102
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ajp:edwast:v:8:y:2024:i:6:p:4291-4307:id:2930. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Melissa Fernandes (email available below). General contact details of provider: https://learning-gate.com/index.php/2576-8484/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.