INTERNATIONAL JOURNAL OF NOVEL RESEARCH AND DEVELOPMENT International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2456-4184 | Impact factor: 8.76 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.76 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
Cybersecurity is a critical concern for organizations worldwide, as the number and severity of cyber-attacks continue to increase. Malware attacks, phishing attacks, SQL injections, and DDoS attacks are just a few of the methods that hackers use to gain unauthorized access to sensitive data, steal information, and cause damage. According to Cybersecurity Ventures, there were 38,09,448 records stolen from breaches every day since 2013, with 158,727 per hour, 2645 per minute, and 44 per second. Despite the growing threat of cyber-attacks, many organizations are ill-equipped to handle sophisticated attacks. Only 38% of global organizations claim to be prepared to handle such attacks, and an estimated 54% of companies report experiencing one or more attacks in the last 12 months. Additionally, cloud security has become an increasingly important area of concern, with distributed denial-of-service (DDoS) and data privacy being the most common cloud security areas, with a 16% level of use and 14%, respectively. To address these issues, machine learning (ML) techniques have been employed in cybersecurity to detect and prevent cyber-attacks. There are 30 ML techniques used, with some being used in hybrid models and others as standalone models. The most popular ML technique used is the Support Vector Machine (SVM) in both hybrid and standalone models. Additionally, 60% of research papers that use ML techniques compared their models with other models to prove their efficiency, and 13 different evaluation metrics were used. Propose to the development of an ML model to detect various types of cyber threats in data, such as DoS, Probe, R2L, and U2R. This model can significantly improve cybersecurity measures and help prevent data loss, data misuse, and stealing data.
Keywords:
Cite Article:
"DETECT AND ASSESS THE CYBERSECURITY THREATS WITH THEIR MITIGATION APPROACHES USING ML ALGORITHM", International Journal of Novel Research and Development (www.ijnrd.org), ISSN:2456-4184, Vol.8, Issue 5, page no.g134-g138, May-2023, Available :http://www.ijnrd.org/papers/IJNRD2305615.pdf
Downloads:
000118745
ISSN:
2456-4184 | IMPACT FACTOR: 8.76 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.76 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Facebook Twitter Instagram LinkedIn