News

CALL FOR PAPERS AUGUST 2024

IJSAR going to launch new issue Volume 05, Issue 08, August 2024; Open Access; Peer Reviewed Journal; Fast Publication. Please feel free to contact us if you have any questions or comments send email to: editor@scienceijsar.com

IMPACT FACTOR: 6.673

Submission last date: 15th August 2024

Literature review of implementation of machine learning algorithms for improving the network security

×

Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6609 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6609 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
Author: 
Ayantika Sarkar and Pradnya Kashikar
Page No: 
6915-6922

Network security is becoming a top priority for people, enterprises, and governments as the digital world advances. Innovative and flexible solutions will be needed due to the growing complexity and diversity of cyberthreats. Machine learning (ML) has become an effective means for improving network security because it can quickly identify, cease, and neutralize many kinds of threats. There are several uses for machine learning in the realm of network security. The applications of machine learning in network security are divided into two categories in this paper: Malware detection system and Intrusion Detection System (IDS) – Signature based IDS and Anomalybased IDS. A few machine learning techniques, such as Supervised learning, Unsupervised learning, and Reinforcement learning, that have been utilized in the field of network security and the threat landscape for network security between 2020 and 2023 is also discussed in this paper. Finally, a literature review of the machine learning techniques in the field of network security have also been discussed based on the survey of various research works.

Download PDF: