A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Aiyanyo, Imatitikua D. | - |
dc.contributor.author | Samuel, Hamman | - |
dc.contributor.author | Lim, Heuiseok | - |
dc.date.accessioned | 2021-08-30T15:44:32Z | - |
dc.date.available | 2021-08-30T15:44:32Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-09 | - |
dc.identifier.issn | 2076-3417 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/53661 | - |
dc.description.abstract | This is a systematic review of over one hundred research papers about machine learning methods applied to defensive and offensive cybersecurity. In contrast to previous reviews, which focused on several fragments of research topics in this area, this paper systematically and comprehensively combines domain knowledge into a single review. Ultimately, this paper seeks to provide a base for researchers that wish to delve into the field of machine learning for cybersecurity. Our findings identify the frequently used machine learning methods within supervised, unsupervised, and semi-supervised machine learning, the most useful data sets for evaluating intrusion detection methods within supervised learning, and methods from machine learning that have shown promise in tackling various threats in defensive and offensive cybersecurity. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.subject | NETWORK INTRUSION DETECTION | - |
dc.subject | CYBER SECURITY | - |
dc.subject | MODEL | - |
dc.subject | ALGORITHM | - |
dc.subject | OPTIMIZATION | - |
dc.subject | FRAMEWORK | - |
dc.title | A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lim, Heuiseok | - |
dc.identifier.doi | 10.3390/app10175811 | - |
dc.identifier.scopusid | 2-s2.0-85090019755 | - |
dc.identifier.wosid | 000569734100001 | - |
dc.identifier.bibliographicCitation | APPLIED SCIENCES-BASEL, v.10, no.17 | - |
dc.relation.isPartOf | APPLIED SCIENCES-BASEL | - |
dc.citation.title | APPLIED SCIENCES-BASEL | - |
dc.citation.volume | 10 | - |
dc.citation.number | 17 | - |
dc.type.rims | ART | - |
dc.type.docType | Review | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Materials Science | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Engineering, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordPlus | NETWORK INTRUSION DETECTION | - |
dc.subject.keywordPlus | CYBER SECURITY | - |
dc.subject.keywordPlus | MODEL | - |
dc.subject.keywordPlus | ALGORITHM | - |
dc.subject.keywordPlus | OPTIMIZATION | - |
dc.subject.keywordPlus | FRAMEWORK | - |
dc.subject.keywordAuthor | cybersecurity | - |
dc.subject.keywordAuthor | machine learning | - |
dc.subject.keywordAuthor | artificial intelligence | - |
dc.subject.keywordAuthor | data mining | - |
dc.subject.keywordAuthor | defensive security | - |
dc.subject.keywordAuthor | offensive security | - |
dc.subject.keywordAuthor | intrusion detection systems | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.