Главная страница

Cache Сохраненный результат вычисления


Скачать 17.48 Kb.
НазваниеCache Сохраненный результат вычисления
Дата07.04.2023
Размер17.48 Kb.
Формат файлаdocx
Имя файлаOutside Reading.docx
ТипДокументы
#1045033

Cybersecurity is gaining more and more attention. Such widespread interest in ML is due to two critical factors: First, it can automate processes that previously required human participation. Second, it can quickly process and analyze huge amounts of information and calculate options using many variables. The main goal of the current work explore ML usage in cybersecurity and research use cases related to the adversary’s use of ML in cyberattacks.

ML is the process by which machines learn from given data, building the logic and predicting output for a given input . ML has three sub-categories: supervised learning, unsupervised learning and reinforcement learning. Neural networks (NNs) are typically organized in layers. Layers consist of a number of interconnected 'nodes' that contain an 'activation function'.

The scope of ML usage in cybersecurity is huge, starting with identifying anomalies and suspicious or unusual behaviours and ending with detecting zero-day vulnerabilities and patching known ones.

Automated vulnerability scanning is one of the most obvious and common tasks in a cyberattack. Exists two scenarios for the weaponization and delivery stages: First, in the case of humanless intrusion, attackers can use a similar tool but utilize information provided by Shodan or Mitch instead of features obtained using a computer vision. Second, attackers can use social engineering, using tools for profiling and for spear-phishing described in the previous section and creating click-bytes links to infect the victim.

We should also note the consequences that more active implementation of ML can bring: automation and the resulting loss of human jobs and inevitable conflict with the existing legal framework, for example, when using technologies to prevent cybercrime or cyberterrorism.

  1. Cache - Сохраненный результат вычисления.

  2. Data processing - Обработка данных

  3. Device driver - Драйвер

  4. Debugger - Отладчик

  5. Database - База данных

  6. an encoding – кодировка

  7. malicious software (malware) вредоносное программное обеспечение

  8. spyware - программа-шпион, шпионское программное обеспечение

  9. cyberattack - кибератака;

  10. cybersecurity - информационная безопасность;

  11. deep learning - глубокое обучение;

  12. machine learning - машинное обучение;

  13. supervised learning - контролируемое обучение;

  14. unsupervised learning - обучение без учителя;

  15. reinforcement learning - обучение с подкреплением;

  16. Neural networks - Нейронные сети;

  17. Generator - генератор;

  18. data mining - это способ анализа данных, предназначенный для поиска ранее неизвестных закономерностей в больших массивах информации;

  19. Cross-Industry Standard Process for Data Mining (CRISP-DM) -Межотраслевой стандартный процесс интеллектуального анализа данных;

  20. ensemble learning - ансамблевое обучение;

  21. clustering - кластеризация;

  22. decision tree - Древо решений;

  23. intrusion detection system (IDS) - система обнаружения вторжений;

  24. Intrusion prevention system (IPS) - Система предотвращения вторжений;

  25. Artificial Neural Networks (ANNs) - Искусственные нейронные сети;

  26. generative adversarial network (GAN) - генеративная состязательная сеть;

  27. Web application firewall (WAF) - Брандмауэр веб-приложений;

  28. Automation - автоматизация;

  29. Cyberterrorism - кибертерроризм;

  30. post-exploitation - постэксплуатационный.


написать администратору сайта