Determining the Efficacy of Machine Learning Strategies in Quelling Cyber Security Threats: Evidence from Selected Literatures

Kodete, Chandra Shikhi and Thuraka, Bharadwaj and Pasupuleti, Vikram and Malisetty, Saiteja (2024) Determining the Efficacy of Machine Learning Strategies in Quelling Cyber Security Threats: Evidence from Selected Literatures. Asian Journal of Research in Computer Science, 17 (8). pp. 24-33. ISSN 2581-8260

[thumbnail of Kodete1782024AJRCOS119589.pdf] Text
Kodete1782024AJRCOS119589.pdf

Download (324kB)

Abstract

The alarming security threats in the internet world continually raise critical concerns among individuals, organizations and governments alike. The sophistication of cyber-attacks makes it imperative for a paradigm shift from traditional approaches and measures for quelling the attacks to modern sophisticated, digital and strategic ones, such as those involving machine learning and other technologies of artificial intelligence (AI). This study is aimed at examining machine learning (ML) strategies for effective cyber security. ML involves using algorithms and statistical models to enable computers learn from and make decisions or predictions based on data. The study relied on secondary data, which were subjected to a systematic review. The results of its thematic and qualitative analyses prove that majority of the literatures allude to the fact that the maximal performance abilities and tactics of the ML constitute its strategies for quelling cyber security. These include its: early detection of threats that are tackled before they cause damages; ability to analyze huge quantity of data quickly and accurately; and processing of datasets in real-time. The study argues that the noted abilities and tactics constitute ML strategies for quelling cyber security, regardless of its challenges like data quality, security vulnerabilities and possible incidences of bias. The study concludes that ML can indeed be used to detect and respond to threats in real-time, ascertain patterns of malicious behavior, and improve on internet security, which thereby prove it to be a viable tool for quelling cyber security.

Item Type: Article
Subjects: STM Academic > Computer Science
Depositing User: Unnamed user with email support@stmacademic.com
Date Deposited: 15 Jul 2024 06:27
Last Modified: 24 Aug 2024 05:54
URI: http://article.researchpromo.com/id/eprint/2400

Actions (login required)

View Item
View Item