Cyber Threats Detection and Mitigation Using Machine Learning

Cyber Threats Detection and Mitigation Using Machine Learning

Vaishnavi Ambalavanan (Pondicherry University, India) and Shanthi Bala P. (Pondicherry University, India)
DOI: 10.4018/978-1-5225-9611-0.ch007
OnDemand PDF Download:
No Current Special Offers


Cyberspace plays a dominant role in the world of electronic communication. It is a virtual space where the interconnecting network has an independent technology infrastructure. The internet is the baseline for the cyberspace which can be openly accessible. Cyber-security is a set of techniques used to protect network integrity and data from vulnerability. The protection mechanism involves the identification of threats and taking precaution by predicting the vulnerabilities in the environment. The main cause of security violation will be threats, that are caused by the intruder who attacks the network or any electronic devices with the intention to cause damage in the communication network. These threats must be taken into consideration for the mitigation process to improve the system efficiency and performance. Machine learning helps to increase the accuracy level in the detection of threats and their mitigation process in an efficient way. This chapter describes the way in which threats can be detected and mitigated in cyberspace with certain strategies using machine learning.
Chapter Preview

Cyber Threats

In the digital revolution, everything is exercised through mobile devices and other electronic gadgets for sharing and accessing of resources with anonymous hazards. The scaling of valuable resources is calibrated based on the information prioritized by the user on their own standard. Even the lowest scaling data must be secured from the malicious act of penetration. The attack can be either active or passive which is used to obtain the desired information from the victim. To avoid such problems, a defensing mechanism is needed to safeguard the resources from invaders.

Complete Chapter List

Search this Book: