Learning Cyber Security and Machine Engineering at The University
Learning Cyber Security and Machine Engineering at The University
Karuniawan, R. R., Santoso, S., Fikri, M. A., Argadilah, M., & Pamungkas, W. A. (2022).
Learning Cyber Security and Machine Engineering at the University. Blockchain Frontier
Technology, 3(1), 89–94.
DOI: https://doi.org/10.34306/bfront.v3i1.242
Abstract
In this review, key literature reviews on network analysis and intrusion detection using
machine learning (ML) and deep learning (DL) approaches are explained. It also provides a
brief lesson description for each ML/DL procedure. This paper covers the datasets used in
machine learning techniques, which are the main instruments for evaluating network traffic
and detecting irregularities. Data holds a key role in ML/DL approaches. We also go into
further detail about the problems with using ML/DL for cybersecurity and make suggestions for
future research.
Keywords: Machine learning, Cyber Security, Machine Engineering, Learning
1. Introduction
The applications of cyber security are considered in this work, which also includes the
findings of a literature review on machine learning (ML), deep learning (DL), and data mining
(DM) techniques [1]. It also describes (ML/DL)/DM approaches and their applicability to
problems with cyber intrusion detection. The study studies the difficulty of several (ML/DL)/DM
algorithms in addition to offering a set of comparison criteria for (ML/DL)/DM approaches [2].
Best practices and a list of suggestions are then provided in consideration of the
characteristics of the cyber situation [3]. Cybersecurity is the umbrella term for a collection of
procedures and tools designed to guard against unauthorized access to, hacking into, altering,
or destroying networks, computers, data, and software [4]. Cyber security systems primarily
consist of network security systems and computer (host) security systems. Each of these
entities must contain at least one intrusion detection system (IDS), firewall, and antivirus
program [5]. IDSs do not only identify information systems; they also find and ascertain their
unauthorized usage, change, duplication, and damage. Security breaches include both
external and internal intrusions (intra-organization assaults and inter-organizational attacks)
[6]. The surge in the frequency of cyberattacks has made artificial intelligence- and
machine-learning-based approaches for detecting security risks an integral part of our daily
life. The best security apps are provided with consideration for their implementation and
security requirements thanks in large part to the security standards [7]. From this angle, they
are essential for cyber security research, such as intrusion detection systems. While certain
datasets and machine and deep learning algorithms can be supported by research studies,
there is little information in the literature on (ML/DL)/DM approaches for cyber security and
datasets linked to security [8]. This survey article focuses on the (ML/DL)/DM approaches with
an emphasis on the (ML/DL)/DM methods and their descriptions with an emphasis on cyber
security. Several reviews as well as other studies using these techniques have also been
published [9]. In contrast to past evaluations, the focus of our paper will be on publications that
meet specific criteria. Google Scholar searches were carried out using methods including
"machine learning" or "deep learning," cybersecurity, and "data mining [10]." One of the key
issues was highly cited papers using well-known approaches. However, it was realized that
fresh and inventive approaches might be disregarded, so a couple of these pieces were also
chosen [11]. Most often, the decision to include at least one and preferably a few sample
papers about each of the (ML/DL)/DM categories was made while choosing the papers to be
included [12]. The rest of this essay is structured as follows: Sect. 2 provided a summary of
some pertinent academic writing. The many (ML/DL)/DM techniques utilized in cyber security
are described in Section 4. The topic of cybersecurity datasets for (ML/DL)/DM is covered in
Section 4, and the paper is concluded with a quick overview of its main ideas and some
concluding notes in Section 5 [13].
2. Literature Review
Machine learning applications offer a unique method for resolving basic scientific and
technical puzzles with the use of computer software [14]. In the last 20 years, there have been
significant advances in machine learning that are accessible to beginners. Machine learning
was essentially started in a "black-box" laboratory environment, developed into a usable
application, and is now being gradually used on a broad scale by commercial enterprises [15].
The advances of machine learning can be seen in the software programs for computer vision,
natural language processing, speech recognition, robot control, and other new applications
[16]. Major businesses like Amazon, Facebook, and Google employ machine learning to
enhance the customer experience, advertise special offers, and suggest purchases [17]. It is
far simpler for machine learning developers to train a system than it is to program the
conventional input-process-output system [18]. They do this by creating simulations of
expected results. Many different businesses have seen how machine learning has affected
data-intensive problems like cybersecurity [19]. To bring about amazing changes, other
subjects like biology, cosmology, and social science can also benefit from using machine
learning. Machine learning can be used in novel ways to analyze and analyze experimental
data. Theoretically, by working on machine learning algorithms, we can comprehend the ideas
of "big data" better. Additionally, these technologies can be used in vertical applications to
enhance associated performance measures [20].
In terms of special functionalities, machine learning algorithms might vary significantly
(e.g., logistic regression, linear Regression, Naive Bayes, decision trees, random forest,
support vector machines, deep learning, and Gradient Boosting algorithms) [21]. To produce
an evolutionary method, machine learning presents innovative approaches to examine vast
amounts of data. The subsequent generations of algorithms can also offer better optimization.
The optimum way to process the vast amount of data is through machine learning and
cybersecurity [22]. The networks and platforms are open to intrusion. The quantity of
instruments used to scan and assess targets affects how effective these attacks are. The
opponents utilize machine learning to intensify their attacks even more [23]. A few surveys on
the security perspective of artificial intelligence and machine learning have recently been
published in some journals [24]. In addition, emphasis was placed on recent literature on
machine learning techniques utilized in the Internet of Things and intrusion detection for
computer network security. After that, major literature reviews on machine learning (ML) and
deep learning (DL) methods were explained for network analysis of intrusion detection along
with an explanation of each ML/DL method. A thorough literature analysis on defensive tactics
and security risks was offered during training and testing or inferring of machine learning from
a data-driven view. Additionally, information on security concerns with artificial intelligence,
particularly about the reinforcement and supervised learning algorithms, was provided. In
contrast, the life cycle of a machine learning-based system from training to inference was
examined. This included updates on security risks and protective strategies [25].
requests. Additionally, HTTP queries are classified as abnormal or regular. With the help of
this dataset, web detection was effectively done.
References
[1] N. Sari, W. A. Gunawan, P. K. Sari, I. Zikri, and A. Syahputra, “Analisis Algoritma Bubble Sort
Secara Ascending Dan Descending Serta Implementasinya Dengan Menggunakan Bahasa
Pemrograman Java,” ADI Bisnis Digit. Interdisiplin J., vol. 3, no. 1, pp. 16–23, 2022.
[2] M. Azmi, M. S. Shihab, D. Rustiana, and D. P. Lazirkha, “The Effect Of Advertising, Sales
Promotion, And Brand Image On Repurchasing Intention (Study On Shopee Users),” IAIC
Trans. Sustain. Digit. Innov., vol. 3, no. 2, pp. 76–85, 2022.
[3] D. Apriani, T. Ramadhan, and E. Astriyani, “Kerja Lapangan Berbasis Website Untuk Sistem
Informasi Manajemen Praktek (Studi Sistem Informasi Program Studi Kasus Merdeka Belajar
Kampus Merdeka (MBKM) Universitas Raharja,” ADI Bisnis Digit. Interdisiplin J., vol. 3, no.
1, pp. 24–29, 2022.
[4] D. Rustiana, J. D. Pratama, T. Mudabbir, and M. A. Fahmi, “Adoption Computerized Certificate
Transparency And Confidentiality,” Int. J. Cyber IT Serv. Manag., vol. 2, no. 1, pp. 1–10, 2022.
[5] P. A. Sunarya, F. Andriyani, Henderi, and U. Rahardja, “Algorithm automaticPrawira, M.,
Sukmana, H. T., Amrizal, V., & Rahardja, U. (2019). A Prototype of Android-Based Emergency
Management Application. 2019 7th International Conference on Cyber and IT Service
Management, CITSM 2019. https://doi.org/10.1109/CI,” Int. J. Adv. Trends Comput. Sci. Eng.,
vol. 8, no. 1.5 Special Issue, pp. 387–391, 2019, doi: 10.30534/ijatcse/2019/6281.52019.
[6] P. Hendriyati, F. Agustin, U. Rahardja, and T. Ramadhan, “Management Information Systems
on Integrated Student and Lecturer Data,” APTISI Trans. Manag., vol. 6, no. 1, pp. 1–9, 2022.
[7] U. Rahardja, “Meningkatkan Kualitas Sumber Daya Manusia Dengan Sistem Pengembangan
Fundamental Agile,” ADI Bisnis Digit. Interdisiplin J., vol. 3, no. 1, pp. 63–68, 2022.
[8] R. Widayanti, U. Rahardja, F. P. Oganda, M. Hardini, and V. T. Devana, “Students Formative
Assessment Framework (Faus) Using the Blockchain,” in 2021 3rd International Conference on
Cybernetics and Intelligent System (ICORIS), 2021, pp. 1–6.
[9] U. Rahardja, Q. Aini, F. P. Oganda, and V. T. Devana, “Secure Framework Based on Blockchain
for E-Learning During COVID-19,” in 2021 9th International Conference on Cyber and IT
Service Management (CITSM), 2021, pp. 1–7.
[10] F. P. Oganda, M. Hardini, and T. Ramadhan, “Pengaruh Penggunaan kontrak cerdas pada
Cyberpreneurship Sebagai Media Pemasaran dalam Dunia Bisnis,” ADI Bisnis Digit.
Interdisiplin J., vol. 2, no. 1, pp. 55–64, 2021.
[11] S. Azizah and B. P. K. Bintoro, “Determining Factors of Continuance Intention to Use QR Code
Mobile Payment on Urban Millennials in Indonesia Empirical Study on Mobile Payment
Funds,” ADI J. Recent Innov., vol. 3, no. 2, pp. 121–138, 2022.
[12] T. C. Husnadi, T. Marianti, and T. Ramadhan, “Determination of shareholders’ welfare with
financing quality as a moderating variable,” APTISI Trans. Manag., vol. 6, no. 2, pp. 191–208,
2022.
[13] D. Rifai, S. Fitri, and I. N. Ramadhan, “Perkembangan Ekonomi Digital Mengenai Perilaku
Pengguna Media Sosial Dalam Melakukan Transaksi,” ADI Bisnis Digit. Interdisiplin J., vol. 3,