Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation

被引:0
|
作者
Puthal, Deepak [1 ,2 ]
Mohanty, Saraju P. [3 ]
Mishra, Amit Kumar [4 ,5 ]
Yeun, Chan Yeob [1 ,2 ]
Damiani, Ernesto [1 ,2 ,6 ]
机构
[1] Khalifa Univ, Ctr C2PS, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept EECS, Abu Dhabi, U Arab Emirates
[3] Univ North Texas, Dept Comp Sci & Engn, Denton, TX USA
[4] Univ Cape Town, Dept Elect Engn, Cape Town, South Africa
[5] Univ West, Dept Engn Sci, Trollhattan, Sweden
[6] Univ Milan, Dept Comp Sci, Milan, Italy
关键词
Machine Learning; Logical Reasoning; cyber security; Synergy of ML and LR; Synergy of ML and LR for cyber security;
D O I
10.1109/ISVLSI59464.2023.10238483
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of machine learning (ML) and logical reasoning (LR) in cyber security is an emerging field that shows great potential for improving the efficiency and effectiveness of security systems. While ML can detect anomalies and patterns in large amounts of data, LR can provide a higher-level understanding of threats and enable better decision-making. This paper explores the future of ML and LR in cyber security and highlights how the integration of these two approaches can lead to more robust security systems. We discuss several use cases that demonstrate the effectiveness of the integrated approach, such as threat detection and response, vulnerability assessment, and security policy enforcement. Finally, we identify several research directions that will help advance the field, including the development of more explainable ML models and the integration of human-in-the-loop approaches.
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [1] Cyber Security Threats and Mitigation Techniques for Multifunctional Devices
    Mutemwa, Muyowa
    Mouton, Francois
    2018 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS), 2018,
  • [2] Machine learning and cyber security
    Karius, Sebastian
    Knoechel, Mandy
    Hesse, Sascha
    Reiprich, Tim
    IT-INFORMATION TECHNOLOGY, 2023, 65 (4-5): : 142 - 154
  • [3] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [4] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [5] Implications of Machine learning in Cyber Security
    Mangalraj, P.
    2019 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE WORKSHOPS (WI 2019 COMPANION), 2019, : 142 - 143
  • [6] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [7] Aviation cyber security: legal aspects of cyber threats
    Michal Klenka
    Journal of Transportation Security, 2021, 14 : 177 - 195
  • [8] Aviation and Cyber security threats
    Lehto, Martti
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [9] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [10] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31