Machine Learning and Cybersecurity—Trends and Future Challenges

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Artificial Intelligence".

Deadline for manuscript submissions: 15 May 2024 | Viewed by 1108

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Electrical Engineering, School of Computing and Engineering, University of Missouri-Kansas City (UMKC), 5000 Holmes St, Kansas City, MO 64110, USA
Interests: machine learning; cybersecurity; quantum computing and optimization

Special Issue Information

Dear Colleagues,

This Special Issue of the journal is dedicated to examining the symbiotic relationship between machine learning and cybersecurity, with a specific focus on its application, progress, and challenges. Encompassing a wide array of topics, including anomaly detection, behavior analysis, adversarial machine learning, and transparent model development, the scope is set to provide a comprehensive overview of the current trends and future prospectives in this dynamic intersection. The primary purpose of this Special Issue is to offer a valuable resource for researchers and practitioners alike, offering deep insights and practical knowledge.

In terms of its contribution to the existing literature, this Special Issue stands as a significant supplement. By delving into the integration of advanced ML algorithms into security systems, it expands upon the evolving landscape of cyber threat detection and response. Furthermore, the exploration of adversarial machine learning sheds light on the critical need for creating models that can withstand sophisticated attacks. This Special Issue also addresses a pressing concern in the field: transparency and interpretability in ML models, which are pivotal for ensuring ethical and regulatory compliance. By providing an encompassing overview of these critical facets, this Special Issue enriches the existing body of knowledge and offers a crucial reference for those engaged in research and practice within the domain of machine learning and cybersecurity. Researchers, practitioners, and policymakers alike will find this Special Issue to be a valuable compendium of knowledge in an era where safeguarding digital spaces is of paramount importance.

Prof. Dr. Wajeb Gharibi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • machine learning
  • cybersecurity
  • anomaly detection
  • behavior analysis
  • adversarial machine learning
  • transparent models
  • digital security
  • threat detection
  • ethical compliance
  • regulatory compliance
  • cyber threats
  • resilient models
  • data security
  • intrusion detection
  • network security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

25 pages, 502 KiB  
Article
Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection
by Ahmet Aksoy, Luis Valle and Gorkem Kar
Electronics 2024, 13(2), 293; https://doi.org/10.3390/electronics13020293 - 09 Jan 2024
Viewed by 782
Abstract
The cybersecurity landscape presents daunting challenges, particularly in the face of Denial of Service (DoS) attacks such as DoS Http Unbearable Load King (HULK) attacks and DoS GoldenEye attacks. These malicious tactics are designed to disrupt critical services by overwhelming web servers with [...] Read more.
The cybersecurity landscape presents daunting challenges, particularly in the face of Denial of Service (DoS) attacks such as DoS Http Unbearable Load King (HULK) attacks and DoS GoldenEye attacks. These malicious tactics are designed to disrupt critical services by overwhelming web servers with malicious requests. In contrast to DoS attacks, there exists nefarious Operating System (OS) scanning, which exploits vulnerabilities in target systems. To provide further context, it is essential to clarify that NMAP, a widely utilized tool for identifying host OSes and vulnerabilities, is not inherently malicious but a dual-use tool with legitimate applications, such as asset inventory services in company networks. Additionally, Domain Name System (DNS) botnets can be incredibly damaging as they harness numerous compromised devices to inundate a target with malicious DNS traffic. This can disrupt online services, leading to downtime, financial losses, and reputational damage. Furthermore, DNS botnets can be used for other malicious activities like data exfiltration, spreading malware, or launching other cyberattacks, making them a versatile tool for cybercriminals. As attackers continually adapt and modify specific attributes to evade detection, our paper introduces an automated detection method that requires no expert input. This innovative approach identifies the distinct characteristics of DNS botnet attacks, DoS HULK attacks, DoS GoldenEye attacks, and OS-Scanning, explicitly using the NMAP tool, even when attackers alter their tactics. By harnessing a representative dataset, our proposed method ensures robust detection of such attacks against varying attack parameters or behavioral shifts. This heightened resilience significantly raises the bar for attackers attempting to conceal their malicious activities. Significantly, our approach delivered outstanding outcomes, with a mid 95% accuracy in categorizing NMAP OS scanning and DNS botnet attacks, and 100% for DoS HULK attacks and DoS GoldenEye attacks, proficiently discerning between malevolent and harmless network packets. Our code and the dataset are made publicly available. Full article
(This article belongs to the Special Issue Machine Learning and Cybersecurity—Trends and Future Challenges)
Show Figures

Figure 1

Back to TopTop