EconPapers    
Economics at your fingertips  
 

Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions

Mohammad Rakibul Isl Bhuiyan, Mahfujur Rahman Faraji (), Mst. Nowshin Tabassum (), Provakar Ghose (), Sukanta Sarbabidya () and Riva Akter ()

Edelweiss Applied Science and Technology, 2024, vol. 8, issue 6, 4291-4307

Abstract: This study aims to explore the application of machine learning (ML) in enhancing cybersecurity measures, focusing specifically on intrusion detection, malware detection, fraud detection, and anomaly detection systems. A systematic review of 743 scholarly papers was conducted, from which 115 were selected for in-depth analysis. The review process involved evaluating advancements in ML techniques within the context of cybersecurity. The findings reveal that ML-driven systems significantly enhance the automation of security processes, improve the recognition of novel threats, and reduce human error in cyber threat management. However, challenges such as adversarial attacks and the need for high-quality model training pose significant barriers to the broader adoption of ML in cybersecurity. The study discusses the implications of these findings, emphasizing the necessity for developing robust and adaptive ML models that can withstand adversarial threats while improving integration across various cybersecurity applications. The insights gained from this research provide a comprehensive overview of the potential benefits and challenges of implementing ML in cybersecurity, highlighting the need for continuous innovation in threat detection mechanisms. This review acknowledges limitations such as the predominance of literature from Western contexts, potentially overlooking insights from other regions. Furthermore, the complexity of implementing ML systems in dynamic cyber environments remains a critical challenge. Future research should concentrate on refining ML algorithms to enhance resilience against adversarial threats, exploring the integration of emerging technologies for improved cybersecurity, and addressing gaps in the existing literature regarding the life cycle of ML models in real-world applications.

Keywords: Cyber threat detection; Cybersecurity; Data security; Information security; Machine learning; Malware detection; Systematic review. (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
https://learning-gate.com/index.php/2576-8484/article/view/2930/1102 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ajp:edwast:v:8:y:2024:i:6:p:4291-4307:id:2930

Access Statistics for this article

More articles in Edelweiss Applied Science and Technology from Learning Gate
Bibliographic data for series maintained by Melissa Fernandes ().

 
Page updated 2025-04-26
Handle: RePEc:ajp:edwast:v:8:y:2024:i:6:p:4291-4307:id:2930