Performance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing Platforms

α
Professor Gabriel Kabanda
Professor Gabriel Kabanda

Send Message

To: Author

Performance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing Platforms

Article Fingerprint

ReserarchID

201FW

Performance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing Platforms Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The purpose of the research is to evaluate Machine Learning and Big Data Analytics paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, processes and operations that are framed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data analysis of large data sets and production of models for the general relationships found among data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, unsupervised, semi-supervised, and reinforcement learning algorithms.

References

51 Cites in Article
  1. D Berman,A Buczak,J Chavis,C Corbett (2019). Survey of Deep Learning Methods for Cyber Security.
  2. I Sarker,A Kayes,S Badsha,H Alqahtani,P Watters,A Ng (2020). Cybersecurity data science: an overview from machine learning perspective.
  3. P Bringas,I Santos (2010). Bayesian Networks for Network Intrusion Detection, Bayesian Network.
  4. M Bloice,A Holzinger (2018). A Tutorial on Machine Learning and Data Science Tools with Python.
  5. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1.
  6. Roy Nielsen (2015). CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan.
  7. K Umamaheswari,S Sujatha (2017). Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud.
  8. K Napanda,H Shah,L Kurup (2015). Artificial Intelligence Techniques for Network Intrusion Detection.
  9. E Proko,A Hyso,D Gjylapi (2018). DETECTING WEB ATTACKS USING MACHINE LEARNING ALGORITHMS.
  10. T Truong,Q Diep,I Zelinka (2020). Artificial Intelligence in the Cyber Domain: Offense and Defense.
  11. S Mazumdar,J Wang (2018). Guide to Vulnerability Analysis for Computer Networks and Systems.
  12. Berlin Wilson,Babak Khazaei,Laurence Hirsch (2015). Enablers and Barriers of Cloud Adoption among Small and Medium Enterprises in Tamil Nadu.
  13. Ibrahim Hashem,Ibrar Yaqoob,Nor Anuar,Salimah Mokhtar,Abdullah Gani,Samee Ullah Khan (2015). The rise of “big data” on cloud computing: Review and open research issues.
  14. M Siti Nurul Mahfuzah,S Sazilah,B Norasiken (2017). An Analysis of Gamification Elements in Online Learning to Enhance Learning Engagement.
  15. F Menzes,G Liska,M Cirillo,M Vivanco (2016). Data Classification with Binary Response through the Boosting Algorithm and Logistic Regression.
  16. W Stallings (2015). Operating System Stability.
  17. Raymond Cox,Null- Wang (2014). Predicting the US bank failure: A discriminant analysis.
  18. Chaowei Yang,Manzhu Yu,Fei Hu,Yongyao Jiang,Yun Li (2017). Utilizing Cloud Computing to address big geospatial data challenges.
  19. J Fernando,L Dawson (2009). The health information system security threat lifecycle: An informatics theory.
  20. M Moorthy,R Baby,S Senthamaraiselvi (2014). An Analysis for Big Data and its Technologies.
  21. R Lakshami (2019). Machine Learning for Cyber Security using Big Data Analytics Journal of Artificial Intelligence.
  22. David Snowdon,Michelle Sargent,Cylie Williams,Stephen Maloney,Kirsten Caspers,Nicholas Taylor (2019). Effective clinical supervision of allied health professionals: a mixed methods study.
  23. Haslinda Hassan (2017). Organisational factors affecting cloud computing adoption in small and medium enterprises (SMEs) in service sector.
  24. E Bou-Harb,P Celeda (2018). Survey of Attack Projection, Prediction, and Forecasting in Cyber Security.
  25. Pense (2014). Pesquisa Nacional de Saude do Escolar.
  26. E Thomas,A Temko,W Marnane,G Boylan,G Lightbody (2013). Discriminative and Generative Classification Techniques Applied to Automated Neonatal Seizure Detection.
  27. M Gercke (2012). Understanding Cybercrime Prevention.
  28. Mrs Sumathymurugan (2014). Detecting Anomaly IDS in Network using Bayesian Network.
  29. Damiano Bolzoni (2009). Revisiting anomaly-based network intrusion detection systems.
  30. W Jiang,L Wang,H Lin (2016). The role of cognitive processes and individual differences in the relationship between abusive supervision and employee career satisfaction.
  31. Lawrence Cunningham (2008). The SEC's Global Accounting Vision: A Realistic Appraisal of a Quixotic Quest.
  32. C Pu,M Kitsuregawa (2019). Unknown Title.
  33. A Suryavanshi (2017). Magnesium oxide nanoparticle-loaded polycaprolactone composite electrospun fiber scaffolds for bone-soft tissue engineering applications: in-vitro and in-vivo evaluation.
  34. D Burt,P Nicholas,K Sullivan,T Scoles (2013). Gilmour, Sir (John) Nicholas, (born 15 Dec. 1970).
  35. Aithal Pai (2017). CSR und Kleinstunternehmen.
  36. Marzantowicz (2014). Corporate Social Responsibility of TSL sector: attitude analysis in the light of research.
  37. Christoph Fehling,Frank Leymann,Ralph Retter,Walter Schupeck,Peter Arbitter (2014). Cloud Computing Patterns.
  38. Kpmg (2018). Endgame: KPMG and Jenkens.
  39. J Kobielus (2018). Deploying Big Data Analytics Applications to the Cloud: Roadmap for Success.
  40. J Lee (2017). 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
  41. Limao Zhang,Xianguo Wu,Miroslaw Skibniewski,Jingbing Zhong,Yujie Lu (2014). Bayesian-network-based safety risk analysis in construction projects.
  42. F Iafrate (2015). From Big Data to Smart Data.
  43. A Almutairi (2016). Improving intrusion detection systems using data mining techniques.
  44. Anatolij Bezemskij,George Loukas,Diane Gan,Richard Anthony (2017). Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks.
  45. J Karimpour,S Lotfi,A Siahmarzkooh (2016). Intrusion detection in network flows based on an optimized clustering criterion.
  46. Z Stefanova (2018). Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems.
  47. K Hammond (2015). Practical Artificial Intelligence for Dummies®, Narrative Science Edition.
  48. Iffat Gheyas,Ali Abdallah (2016). Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis.
  49. Murat Kantarcioglu,Bowei Xi (2016). Adversarial Data Mining.
  50. R Kumar (2011). Research Methodology: A step by step guide for beginners 3 rd.
  51. C Kothari (2004). Research Methodology Methods and Techniques 2 nd Revised Edition.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Professor Gabriel Kabanda. 2021. \u201cPerformance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing Platforms\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJCST-G Volume 21 (GJCST Volume 21 Issue G2): .

Download Citation

Enhanced ALT text: Research paper on big data analytics paradigms in cybersecurity and cloud computing.
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-G Classification: K.4.4
Version of record

v1.2

Issue date

August 20, 2021

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 3506
Total Downloads: 1042
2026 Trends
Related Research

Published Article

The purpose of the research is to evaluate Machine Learning and Big Data Analytics paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, processes and operations that are framed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data analysis of large data sets and production of models for the general relationships found among data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, unsupervised, semi-supervised, and reinforcement learning algorithms.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Performance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing Platforms

Professor Gabriel Kabanda
Professor Gabriel Kabanda

Research Journals