scholarly journals OVERVIEW OF MACHINE LEARNING IN CYBERSECURITY COMPARATIVE ANALYSIS OF CLASSIFIERS USING WEKA

2021 ◽  
Vol 23 (08) ◽  
pp. 334-343
Author(s):  
Shweta Sharma ◽  

Technologies have made a drastic change over years from mainframe computers to laptops, from telephone to cellular phone everything is changing and becoming digital. The online platform is the new way of working whether it is related to education, social gathering or business everything is going online which is easy, comfortable and consumes less time. Smart tv smartphones smartwatches that come under the category of IoT has been deployed all over the world nowadays, features like voice recognition system face detection system have become a crucial part of the most of the smart device. Nowadays it has become an essential part of our daily life but with the benefits, there is also a major concern that is increasing day by day that is cyber-attack. Security over cyberspace is a most crucial thing what user seeks for When security & machine learning both come into one picture it makes a huge impact on user’s safety. This research paper deals with the overview of machine learning and the need for machine learning in cybersecurity. I have also performed a comparison between two classifiers Naïve Bayes and decision tree by feeding the spam email dataset in the WEKA tool. The motive behind doing this classification is to check which classifier can interpret the result more accurately.

2019 ◽  
Vol 8 (3) ◽  
pp. 5626-5629

Attacks are many types to disturb the network or any other websites. Phishing attacks (PA) are a type of attacks which attack the website and damage the website and may lose the data. Many types of research have been done to prevent the attacks. To overcome this, in this paper, the integrated phishing attack detection system which is adopted with SVM classifier is implemented to detect phishing websites. Phishing is the cyber attack that will destroy the website and may attack with the virus. There are two parameters that can detect the final phishing detection rate such as Identity, and security. Phishing attacks also occur in various banking and e-commerce websites. This paper deals with the UCL machine learning phishing dataset which consists of 32 attributes. The proposed algorithm implements on this dataset and shows the performance.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 8
Author(s):  
Mr. Rahul Y. Pawar ◽  
Dr C.Mahesh

Mobile Phone manufacturers are continuously working to take move on with rapid pace on their new models and to match with the need of customer, they need to customize their system. However the security scenarios of such practice are not that known, due to this various malware and viruses are increasing day by day and causing harm to the devices. Due to the substantial damage caused by malware in last few years certain significant efforts on developing detection and defense mechanism against malwares. For detecting such malicious applications and malwares a security system should be developed which will target such anomaly or outliers in system. In data mining anomaly detection system plays a major role by monitoring the behavior of an application and categorizing them in to normal and abnormal to detect malwares present in the system.  


Author(s):  
S. W. Kwon ◽  
I. S. Song ◽  
S. W. Lee ◽  
J. S. Lee ◽  
J. H. Kim ◽  
...  

2019 ◽  
Vol 28 (1) ◽  
pp. 343-384 ◽  
Author(s):  
Gamal Eldin I. Selim ◽  
EZZ El-Din Hemdan ◽  
Ahmed M. Shehata ◽  
Nawal A. El-Fishawy

2020 ◽  
Vol 26 (26) ◽  
pp. 3049-3058
Author(s):  
Ting Liu ◽  
Hua Tang

The number of human deaths caused by malaria is increasing day-by-day. In fact, the mitochondrial proteins of the malaria parasite play vital roles in the organism. For developing effective drugs and vaccines against infection, it is necessary to accurately identify mitochondrial proteins of the malaria parasite. Although precise details for the mitochondrial proteins can be provided by biochemical experiments, they are expensive and time-consuming. In this review, we summarized the machine learning-based methods for mitochondrial proteins identification in the malaria parasite and compared the construction strategies of these computational methods. Finally, we also discussed the future development of mitochondrial proteins recognition with algorithms.


Author(s):  
M. Ilayaraja ◽  
S. Hemalatha ◽  
P. Manickam ◽  
K. Sathesh Kumar ◽  
K. Shankar

Cloud computing is characterized as the arrangement of assets or administrations accessible through the web to the clients on their request by cloud providers. It communicates everything as administrations over the web in view of the client request, for example operating system, organize equipment, storage, assets, and software. Nowadays, Intrusion Detection System (IDS) plays a powerful system, which deals with the influence of experts to get actions when the system is hacked under some intrusions. Most intrusion detection frameworks are created in light of machine learning strategies. Since the datasets, this utilized as a part of intrusion detection is Knowledge Discovery in Database (KDD). In this paper detect or classify the intruded data utilizing Machine Learning (ML) with the MapReduce model. The primary face considers Hadoop MapReduce model to reduce the extent of database ideal weight decided for reducer model and second stage utilizing Decision Tree (DT) classifier to detect the data. This DT classifier comprises utilizing an appropriate classifier to decide the class labels for the non-homogeneous leaf nodes. The decision tree fragment gives a coarse section profile while the leaf level classifier can give data about the qualities that influence the label inside a portion. From the proposed result accuracy for detection is 96.21% contrasted with existing classifiers, for example, Neural Network (NN), Naive Bayes (NB) and K Nearest Neighbor (KNN).


Author(s):  
Yu Shao ◽  
Xinyue Wang ◽  
Wenjie Song ◽  
Sobia Ilyas ◽  
Haibo Guo ◽  
...  

With the increasing aging population in modern society, falls as well as fall-induced injuries in elderly people become one of the major public health problems. This study proposes a classification framework that uses floor vibrations to detect fall events as well as distinguish different fall postures. A scaled 3D-printed model with twelve fully adjustable joints that can simulate human body movement was built to generate human fall data. The mass proportion of a human body takes was carefully studied and was reflected in the model. Object drops, human falling tests were carried out and the vibration signature generated in the floor was recorded for analyses. Machine learning algorithms including K-means algorithm and K nearest neighbor algorithm were introduced in the classification process. Three classifiers (human walking versus human fall, human fall versus object drop, human falls from different postures) were developed in this study. Results showed that the three proposed classifiers can achieve the accuracy of 100, 85, and 91%. This paper developed a framework of using floor vibration to build the pattern recognition system in detecting human falls based on a machine learning approach.


Sign in / Sign up

Export Citation Format

Share Document