(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-7 Issue-25 January-2022
Full-Text PDF
Paper Title : Cybersecurity data science and threats: an overview from machine learning perspective
Author Name : Shivam Priyadarshi and M. Adil Hashmi
Abstract :

Cybersecurity has become a significant threat to all operations in the modern world. Due to the continuous development of information and communication (ICT) technologies, the efficiency of machine operation has been improved. Therefore, extracting the pattern of a security incident from the cybersecurity and corresponding data-driven model is the primary element to make an automated security system. To analyse and understand the actual phenomena, different machine learning methods, systems and processes are used. This work also sheds light on how the security system and measures can be improved and maintained by bringing innovation in technology and upgrading the power systems. An example of cybersecurity risks in power systems is the two simultaneous malicious attacks that occurred in 2015 and 2016. Besides, in the IT and healthcare industry, the number of cyberattacks is increasing daily, increasing the cost of data breaches. The distribution of cyberattacks across different countries is discussed in this research. Additionally, issues of cyber physical system (CPS) and its impacts on human society have also been inspected in the work following.

Keywords : Cybersecurity, Cyber physical systems, Machine learning, Information and communication.
Cite this article : Priyadarshi S, Hashmi MA. Cybersecurity data science and threats: an overview from machine learning perspective . ACCENTS Transactions on Information Security. 2022; 7 (25): 1-8. DOI:10.19101/TIS.2021.621013.
References :
[1]Sarker IH, Kayes AS, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data. 2020; 7:1-29.
[Crossref] [Google Scholar]
[2]Zong S, Ritter A, Mueller G, Wright E. Analyzing the perceived severity of cybersecurity threats reported on social media. arXiv preprint arXiv:1902.10680. 2019:1-11.
[Crossref] [Google Scholar]
[3]Bagale GS, Vandadi VR, Singh D, Sharma DK, Garlapati DV, Bommisetti RK, et al. Small and medium-sized enterprises contribution in digital technology. Annals of Operations Research. 2021:1-24.
[Crossref] [Google Scholar]
[4]Sadiq A, Anwar M, Butt RA, Masud F, Shahzad MK, Naseem S, Younas M. A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0. Human Behavior and Emerging Technologies. 2021; 3(5):854-64.
[Crossref] [Google Scholar]
[5]Neto NN, Madnick S, Paula AM, Borges NM. Developing a global data breach database and the challenges encountered. Journal of Data and Information Quality. 2021; 13(1):1-33.
[Crossref] [Google Scholar]
[6]Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K. Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics. 2020; 9(1):1-19.
[Crossref] [Google Scholar]
[7]Saxena N, Hayes E, Bertino E, Ojo P, Choo KK, Burnap P. Impact and key challenges of insider threats on organizations and critical businesses. Electronics. 2020; 9(9):1-29.
[Crossref] [Google Scholar]
[8]https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/. Accessed 10 November 2022.
[9]Kurniati E, Sahide A. Paris call as french diplomacy instrument. International Journal of Multicultural and Multireligious Understanding. 2022; 9(8):442-54.
[Crossref] [Google Scholar]
[10]Alahmari A, Duncan B. Cybersecurity risk management in small and medium-sized enterprises: a systematic review of recent evidence. In international conference on cyber situational awareness, data analytics and assessment 2020(pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[11]Kavallieratos G, Katsikas S. Managing cyber security risks of the cyber-enabled ship. Journal of Marine Science and Engineering. 2020; 8(10):1-19.
[Crossref] [Google Scholar]
[12]Yaacoub JP, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M. Cyber-physical systems security: limitations, issues and future trends. Microprocessors and Microsystems. 2020; 77:1-33.
[Crossref] [Google Scholar]
[13]Zhang J, Pan L, Han QL, Chen C, Wen S, Xiang Y. Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE/CAA Journal of Automatica Sinica. 2021; 9(3):377-91.
[Crossref] [Google Scholar]
[14]Ma C. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports. 2021; 7:7999-8012.
[Crossref] [Google Scholar]
[15]Seemma PS, Nandhini S, Sowmiya M. Overview of cyber security. International Journal of Advanced Research in Computer and Communication Engineering. 2018; 7(11):125-8.
[Google Scholar]
[16]Alqahtani H, Sarker IH, Kalim A, Minhaz Hossain SM, Ikhlaq S, et al. Cyber intrusion detection using machine learning classification techniques. In computing science, communication and security: first international conference 2020 (pp. 121-31). Springer Singapore.
[Crossref] [Google Scholar]
[17]Soto-Acosta P. COVID-19 pandemic: Shifting digital transformation to a high-speed gear. Information Systems Management. 2020; 37(4):260-6.
[Crossref] [Google Scholar]
[18]Lallie HS, Shepherd LA, Nurse JR, Erola A, Epiphaniou G, Maple C, et al. Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security. 2021; 105:1-20.
[Crossref] [Google Scholar]
[19]Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Reports. 2021; 7:8176-86.
[Crossref] [Google Scholar]
[20]Ahmad A, Desouza KC, Maynard SB, Naseer H, Baskerville RL. How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology. 2020; 71(8):939-53.
[Crossref] [Google Scholar]
[21]Sharif MH, Mohammed MA. A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews. 2022; 15(1):138-56.
[Crossref] [Google Scholar]
[22]Bubukayr MA, Almaiah MA. Cybersecurity concerns in smart-phones and applications: a survey. In international conference on information technology 2021 (pp. 725-31). IEEE.
[Crossref] [Google Scholar]
[23]Bongomin O, Gilibrays Ocen G, Oyondi Nganyi E, Musinguzi A, Omara T. Exponential disruptive technologies and the required skills of industry 4.0. Journal of Engineering. 2020; 2020:1-7.
[Crossref] [Google Scholar]
[24]Kettani H, Wainwright P. On the top threats to cyber systems. In 2nd international conference on information and computer technologies 2019 (pp. 175-9). IEEE.
[Crossref] [Google Scholar]
[25]Reich J, Schneider D, Sorokos I, Papadopoulos Y, Kelly T, Wei R, et al. Engineering of runtime safety monitors for cyber-physical systems with digital dependability identities. In computer safety, reliability, and security: 39th international conference, 2020 (pp. 3-17). Springer International Publishing.
[Crossref] [Google Scholar]
[26]Tantawy A. On the elements of datasets for cyber physical systems security. arXiv preprint arXiv:2208.08255. 2022.
[Crossref] [Google Scholar]
[27]Aslan ÖA, Samet R. A comprehensive review on malware detection approaches. IEEE Access. 2020; 8:6249-71.
[Crossref] [Google Scholar]
[28]Sarker IH, Furhad MH, Nowrozy R. Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science. 2021; 2:1-8.
[Crossref] [Google Scholar]
[29]Ghelani D, Hua TK, Koduru SK. Cyber security threats, vulnerabilities, and security solutions models in banking. Authorea Preprints. 2022.
[Google Scholar]
[30]Othman SM, Alsohybe NT, Ba-Alwi FM, Zahary AT. Survey on intrusion detection system types. International Journal of Cyber-Security and Digital Forensics. 2018; 7(4):444-63.
[Google Scholar]
[31]Einy S, Oz C, Navaei YD. The anomaly-and signature-based IDS for network security using hybrid inference systems. Mathematical Problems in Engineering. 2021; 2021:1-10.
[Crossref] [Google Scholar]
[32]Abdullah TA, Ali W, Malebary S, Ahmed AA. A review of cyber security challenges attacks and solutions for Internet of Things based smart home. IJCSNS International Journal of Computer Science and Network Security. 2019; 19(9):139-46.
[Google Scholar]
[33]Al-Alawi AI, Al-Bassam MS. The significance of cybersecurity system in helping managing risk in banking and financial sector. Journal of Xidian University. 2020; 14(7):1523-36.
[Crossref] [Google Scholar]
[34]Nieto A, Acien A, Fernandez G. Crowdsourcing analysis in 5G IoT: cybersecurity threats and mitigation. Mobile Networks and Applications. 2019; 24:881-9.
[Crossref] [Google Scholar]
[35]Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, et al. Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies. 2020; 13(10):1-27.
[Crossref] [Google Scholar]
[36]Narayanan SN, Ganesan A, Joshi K, Oates T, Joshi A, Finin T. Early detection of cybersecurity threats using collaborative cognition. In 4th international conference on collaboration and internet computing 2018 (pp. 354-63). IEEE.
[Crossref] [Google Scholar]
[37]Altulaihan E, Almaiah MA, Aljughaiman A. Cybersecurity threats, countermeasures and mitigation techniques on the IoT: future research directions. Electronics. 2022; 11(20):1-41.
[Crossref] [Google Scholar]
[38]Lee K, Yim K. Cybersecurity threats based on machine learning-based offensive technique for password authentication. Applied Sciences. 2020; 10(4):1-16.
[Crossref] [Google Scholar]
[39]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI sixth international conference on software engineering 2012 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[40]Dubey AK, Gupta U, Jain S. Computational measure of cancer using data mining and optimization. In sustainable communication networks and application 2020 (pp. 626-32). Springer International Publishing.
[Crossref] [Google Scholar]
[41]Dubey A, Gupta U, Jain S. Medical data clustering and classification using TLBO and machine learning algorithms. Computers, Materials and Continua. 2021; 70(3):4523-43.
[Crossref] [Google Scholar]
[42]Nemade V, Pathak S, Dubey AK, Barhate D. A review and computational analysis of breast cancer using different machine learning techniques. International Journal of Emerging Technology and Advanced Engineering. 2022; 12(3):111-8.
[Crossref] [Google Scholar]
[43]Chahar R, Dubey AK, Narang SK. A review and meta-analysis of machine intelligence approaches for mental health issues and depression detection. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(83):1279-314.
[Crossref] [Google Scholar]
[44]Patil SS, Patidar K, Saxena G, Sharma N. An improve image security algorithm using hybrid cryptography approach. ACCENTS Transactions on Information Security. 2021; 6 (23):13-9.
[Crossref]
[45]Shrivastava A, Dubey AK. An efficient hybrid encryption approach with bit shuffling for image data security. ACCENTS Transactions on Information Security. 2021; 6(24):20-25.
[Crossref]