Abstract
This study summarizes major literature reviews on machine learning systems for network analysis and intrusion detection. Furthermore, it provides a brief lesson description of each machine learning approach. Because data is so important in machine learning methods, this study The primary tools for assessing network traffic and spotting anomalies are machine learning approaches, and the study focuses on the datasets utilized in these techniques. This research examine the multiple advantages (reasonable use) that machine learning has made possible, particularly for security and cyber-physical systems, including enhanced intrusion detection techniques and judgment accuracy. Additionally, this study discusses the difficulties of utilizing machine learning for cybersecurity and offers suggestions for further study.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Transactions on Education Technology (ITEE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.