Welcome to IJSDR UGC CARE norms ugc approved journal norms IJRTI Research Journal | ISSN : 2455-2631
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.15 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

Issue: March 2023

Volume 8 | Issue 3

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Performance Analysis of Various Machine Learning based Algorithms on Cyber security Approaches
Authors Name: Mr. VS.Pavan Kumar , Dr.S.Arivalagan , Dr.M.Murugesan , Dr.P.Sudhakar
Unique Id: IJSDR2303050
Published In: Volume 8 Issue 3, March-2023
Abstract: Pervasive use and development of the Internet and its mobile applications extended cyberspace. Cyberspace is prone to prolong and automated cyber-attacks. Cyber security methods render advancements in security measures to find cyberattacks. Conventional security systems are ineffective as cybercriminals were smart enough to avoidclassical security systems. Traditional security system is ineffective in identifying polymorphic security attacks. Machine learning (ML) approaches had a significant contributiontovarious applications of cybersecurity. In spite of the success, there exist certain difficultiesin assuringthe reliability of the ML mechanism. There were incentivized malicious adversariespresented in cyberspace that are ready to use these ML vulnerabilities. This study offers a detailed examination of various ML models to detect cyberattacks and accomplish cybersecurity. This study presents a detailed discussion of existing ML models for cyber security comprising intrusion detection, spam detection, and malware detection in recent days. In addition, the basic concepts of cybersecurity and cyberattacks are elaborated in detail. In addition, we have discussed the existing ML models for cybersecurity along with their aim, methodology, and experimental data. At the end of the study, a detailed overview of cybersecurity, cyberattacks, and recent cyberattack detection models are elaborated briefly.
Keywords: Cybersecurity; Machine learning; Cyberattacks; Data driven models; Security; Artificial Intelligence
Cite Article: "Performance Analysis of Various Machine Learning based Algorithms on Cyber security Approaches", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 3, page no.300 - 306, March-2023, Available :http://www.ijsdr.org/papers/IJSDR2303050.pdf
Downloads: 00021
Publication Details: Published Paper ID: IJSDR2303050
Registration ID:204379
Published In: Volume 8 Issue 3, March-2023
DOI (Digital Object Identifier):
Page No: 300 - 306
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview

Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media

Indexing Partner