Intelligent Incident Response Systems Using Machine Learning

Neibo Augustine Olobo, Waliu Adebayo Ayuba, Abiamamela Obi-Obuoha, Izevbigie Hope Iyobosa, Aderemi Ibraheem Adebayo, Ishiwu Ifeanyichukwu Jude, Chioma Jessica Ifechukwu

Abstract

Machine learning (ML) is revolutionising cybersecurity by enhancing the ability to predict, detect, and respond to cyber threats. By leveraging advanced algorithms, ML systems can analyse vast datasets in real-time, identify patterns, and automate responses, addressing the challenges of increasingly sophisticated cyberattacks. This paper explores the transformative impact of machine learning in cybersecurity, highlighting key tasks such as classification, anomaly detection, and natural language processing. It also discusses future research directions, including explainable AI, adversarial machine learning, federated learning, and privacy-preserving techniques. The cybersecurity community can develop more robust and adaptive defences by focusing on these innovative areas, ensuring a safer digital environment. Integrating machine learning into cybersecurity practices is crucial for navigating the evolving threat landscape and maintaining trust in digital systems.



Keywords


Intelligent Incident Response; Machine Learning; Threat Detection; Automated Response; Predictive Analytics

Full Text:

PDF


References


1. Ahmed, M., Mahmood, A. N., & Hu, J. (2015). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. doi: 10.1016/j.jnca.2015.11.016

2. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection. ACM Computing Surveys, 41(3), 1–58. doi: 10.1145/1541880.1541882

3. Madsen, H., Grov, G., Mancini, F., Baksaas, M., & Sommervoll, Å. Å. (2024). Exploring reinforcement learning for incident response in autonomous military vehicles. arXiv (Cornell University). doi: 10.48550/arxiv.2410.21407

4. Bhardwaj, A., & Kaushik, K. (2022). Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure. International Journal of Cloud Applications and Computing, 12(1), 1–20. doi: 10.4018/ijcac.297106

5. Tolba, A., Mostafa, N. N., & Sallam, K. M. (2024). Hybrid Deep Learning-Based Model for Intrusion Detection. Artificial Intelligence in Cybersecurity, 1, 1–11. doi: 10.61356/j.aics.2024.1198

6. Gupta, A., & Sharma, L. S. (2019). Mitigation of DOS and port scan attacks using Snort. International Journal of Computer Sciences and Engineering, 7(4), 248–258. doi: 10.26438/ijcse/v7i4.248258

7. Zamfiroiu, A., & Sharma, R. C. (2022). Cybersecurity management for incident response. Romanian Cyber Security Journal, 4(1), 69–75. doi: 10.54851/v4i1y202208

8. Fernandes, G., Rodrigues, J. J. P. C., Carvalho, L. F., Al-Muhtadi, J. F., & Proença, M. L. (2018). A comprehensive survey on network anomaly detection. Telecommunication Systems, 70(3), 447–489. doi: 10.1007/s11235-018-0475-8

9. Sommer, R., & Paxson, V. (2010). Outside the closed world: on using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. doi: 10.1109/sp.2010.25

10. Rani, S. S., & Reeja, S. R. (2019). A survey on different approaches for malware detection using machine learning techniques. Lecture notes on data engineering and communications technologies, 389–398. doi: 10.1007/978-3-030-34515-0_42

11. Alanezi, M. (2021). Phishing Detection Methods: A review. Technium Romanian Journal of Applied Sciences and Technology, 3(9), 19–35. doi: 10.47577/technium.v3i9.4973

12. Tin, T. T., Xin, K. J., Aitizaz, A., Tiung, L. K., Keat, T. C., & Sarwar, H. (2023). Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data. International Journal of Advanced Computer Science and Applications, 14(9). doi: 10.14569/ijacsa.2023.0140987

13. Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE Access, 8, 222310–222354. doi: 10.1109/access.2020.3041951

14. Lima, R. F., & Pereira, A. C. M. (2015). A Fraud Detection Model Based on Feature Selection and Undersampling Applied to Web Payment Systems. Conference: 2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT). doi: 10.1109/wi-iat.2015.13

15. Bertino, E., & Islam, N. (2017). Botnets and Internet of Things security. Computer, 50(2), 76–79. doi: 10.1109/mc.2017.62

16. Gunuganti, A. (2023). Behavioural biometrics for continuous authentication. Journal of Biosensors and Bioelectronics Research, 1–5. doi: 10.47363/jbber/2023(1)122

17. Moustafa, N., & Slay, J. (2015). The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. Conference: 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 25–31. doi: 10.1109/badgers.2015.014


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2024 Neibo Augustine Olobo, Waliu Adebayo Ayuba, Abiamamela Obi-Obuoha, Izevbigie Hope Iyobosa, Aderemi Ibraheem Adebayo, Ishiwu Ifeanyichukwu Jude, Chioma Jessica Ifechukwu

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.