The Role of Machine Learning in Cybersecurity
- URL: http://arxiv.org/abs/2206.09707v1
- Date: Mon, 20 Jun 2022 10:56:08 GMT
- Title: The Role of Machine Learning in Cybersecurity
- Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam
Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di
Franco
- Abstract summary: Deployment of Machine Learning in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice.
This paper is the first attempt to provide a holistic understanding of the role of ML in the entire cybersecurity domain.
We highlight the advantages of ML with respect to human-driven detection methods, as well as the additional tasks that can be addressed by ML in cybersecurity.
- Score: 1.6932802756478726
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Machine Learning (ML) represents a pivotal technology for current and future
information systems, and many domains already leverage the capabilities of ML.
However, deployment of ML in cybersecurity is still at an early stage,
revealing a significant discrepancy between research and practice. Such
discrepancy has its root cause in the current state-of-the-art, which does not
allow to identify the role of ML in cybersecurity. The full potential of ML
will never be unleashed unless its pros and cons are understood by a broad
audience.
This paper is the first attempt to provide a holistic understanding of the
role of ML in the entire cybersecurity domain -- to any potential reader with
an interest in this topic. We highlight the advantages of ML with respect to
human-driven detection methods, as well as the additional tasks that can be
addressed by ML in cybersecurity. Moreover, we elucidate various intrinsic
problems affecting real ML deployments in cybersecurity. Finally, we present
how various stakeholders can contribute to future developments of ML in
cybersecurity, which is essential for further progress in this field. Our
contributions are complemented with two real case studies describing industrial
applications of ML as defense against cyber-threats.
Related papers
- A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions [12.044950530380563]
The recent progression of Large Language Models (LLMs) has witnessed great success in the fields of data-centric applications.
We provide an overview for the recent activities of LLMs in cyber defence sections.
Fundamental concepts of the progression of LLMs from Transformers, Pre-trained Transformers, and GPT is presented.
arXiv Detail & Related papers (2024-05-23T12:19:07Z) - Large Language Models for Cyber Security: A Systematic Literature Review [14.924782327303765]
We conduct a comprehensive review of the literature on the application of Large Language Models in cybersecurity (LLM4Security)
We observe that LLMs are being applied to a wide range of cybersecurity tasks, including vulnerability detection, malware analysis, network intrusion detection, and phishing detection.
Third, we identify several promising techniques for adapting LLMs to specific cybersecurity domains, such as fine-tuning, transfer learning, and domain-specific pre-training.
arXiv Detail & Related papers (2024-05-08T02:09:17Z) - The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative [55.08395463562242]
Multimodal Large Language Models (MLLMs) are constantly defining the new boundary of Artificial General Intelligence (AGI)
Our paper explores a novel vulnerability in MLLM societies - the indirect propagation of malicious content.
arXiv Detail & Related papers (2024-02-20T23:08:21Z) - Large Language Models in Cybersecurity: State-of-the-Art [4.990712773805833]
The rise of Large Language Models (LLMs) has revolutionized our comprehension of intelligence bringing us closer to Artificial Intelligence.
This study examines the existing literature, providing a thorough characterization of both defensive and adversarial applications of LLMs within the realm of cybersecurity.
arXiv Detail & Related papers (2024-01-30T16:55:25Z) - Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review [51.31851488650698]
Machine learning (ML) sees an increasing prevalence of being used in the internet-of-things (IoT)-based smart grid.
adversarial distortion injected into the power signal will greatly affect the system's normal control and operation.
It is imperative to conduct vulnerability assessment for MLsgAPPs applied in the context of safety-critical power systems.
arXiv Detail & Related papers (2023-08-30T03:29:26Z) - Pitfalls of Explainable ML: An Industry Perspective [29.49574255183219]
Explanations sit at the core of desirable attributes of a machine learning (ML) system.
The goal of explainable ML is to intuitively explain the predictions of a ML system, while adhering to the needs to various stakeholders.
arXiv Detail & Related papers (2021-06-14T21:05:05Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Understanding the Usability Challenges of Machine Learning In
High-Stakes Decision Making [67.72855777115772]
Machine learning (ML) is being applied to a diverse and ever-growing set of domains.
In many cases, domain experts -- who often have no expertise in ML or data science -- are asked to use ML predictions to make high-stakes decisions.
We investigate the ML usability challenges present in the domain of child welfare screening through a series of collaborations with child welfare screeners.
arXiv Detail & Related papers (2021-03-02T22:50:45Z) - Towards a Robust and Trustworthy Machine Learning System Development [0.09236074230806578]
We present our recent survey on the state-of-the-art ML trustworthiness and technologies from a security engineering perspective.
We then push our studies forward above and beyond a survey by describing a metamodel we created that represents the body of knowledge in a standard and visualized way for ML practitioners.
We propose future research directions motivated by our findings to advance the development of robust and trustworthy ML systems.
arXiv Detail & Related papers (2021-01-08T14:43:58Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.