Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
Kamran Shaukat,
Suhuai Luo,
Vijay Varadharajan,
Ibrahim A. Hameed,
Shan Chen,
Dongxi Liu and
Jiaming Li
Additional contact information
Kamran Shaukat: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Suhuai Luo: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Vijay Varadharajan: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Ibrahim A. Hameed: Department of ICT and Natural Sciences, Norwegian University of Science and Technology, 7491 Trondheim, Norway
Shan Chen: School of Electrical Engineering and Computing, The University of Newcastle, Newcastle 2308, Australia
Dongxi Liu: Data61, Commonwealth Scientific and Industrial Research Organization, Canberra 3169, Australia
Jiaming Li: Data61, Commonwealth Scientific and Industrial Research Organization, Canberra 3169, Australia
Energies, 2020, vol. 13, issue 10, 1-27
Abstract:
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.
Keywords: cybersecurity; machine learning; malware detection; intrusion detection system; spam classification (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2020
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (10)
Downloads: (external link)
https://www.mdpi.com/1996-1073/13/10/2509/pdf (application/pdf)
https://www.mdpi.com/1996-1073/13/10/2509/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:13:y:2020:i:10:p:2509-:d:358837
Access Statistics for this article
Energies is currently edited by Ms. Agatha Cao
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().