...
首页> 外文期刊>Machine Learning Research >Cybersecurity and Cyber Forensics: Machine Learning Approach
【24h】

Cybersecurity and Cyber Forensics: Machine Learning Approach

机译:网络安全和Cyber​​取证:机器学习方法

获取原文
   

获取外文期刊封面封底 >>

       

摘要

The proliferation of cloud computing and internet of things has led to the connectivity of states and nations (developed and developing countries) worldwide in which global network provide platform for the connection. Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which are perfectly enough for the court of law to use and make a judgment based on the comprehensiveness, authenticity and objectivity of the information obtained. Cybersecurity is of major concerned to the internet users worldwide due to the recent form of attacks, threat, viruses, intrusion among others going on every day among internet of things. The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics, systematic survey method was used on recent application of machine learning algorithms on cyber forensics and cyber security based on this findings it is observed that cybersecurity is based on confidentiality, integrity and validity of data, it is also noted that there are ten steps to cybersecurity; network security, user education and awareness, malware prevention, removable media control, secure configuration, managing user privileges, incident management, monitoring and home and mobile working and pave away for further research directions on the application of deep learning, computational intelligence, soft computing to cybersecurity and cyber forensics.
机译:云计算和内容互联网的扩散导致了全球各国和国家(开发和发展中国家)的连通性,其中全球网络为连接提供平台。数字取证是一种计算机安全领域,它使用软件应用和标准指南,这些指南支持从任何计算机设备的提取,这些准则从任何计算机设备都足够完全以法院使用,并根据全面,真实性和客观性作出判断获得的信息。由于最近的攻击,威胁,病毒,互联网中的其他人之间,由于最近的攻击,威胁,病毒,侵入,因此网络安全是全世界的互联网用户。这项工作的目的是对机器学习算法的应用,系统审查对网络安全和Cyber​​取证,基于该发现,用于最近应用机器学习算法和网络安全的应用程序,从而观察到网络安全是基于数据的机密性,完整性和有效性,也有人指出,网络安全有十个步骤;网络安全,用户教育和认识,恶意软件预防,可移动媒体控制,安全配置,管理用户特权,事件管理,监控和家庭以及移动工作以及铺设了对深度学习,计算智能,软计算的进一步研究方向的进一步研究方向网络安全和网络取证。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号