Issue |
E3S Web Conf.
Volume 491, 2024
International Conference on Environmental Development Using Computer Science (ICECS’24)
|
|
---|---|---|
Article Number | 02025 | |
Number of page(s) | 16 | |
Section | Smart Systems for Environmental Development | |
DOI | https://doi.org/10.1051/e3sconf/202449102025 | |
Published online | 21 February 2024 |
Safeguarding Critical Infrastructures: Machine Learning in Cybersecurity
1 Assistant Professor, Symbiosis Law School, Nagpur Campus, Symbiosis International (Deemed University), Pune, India. Email: deeptik@slsnagpur.edu.in
2 Professor, Department of Information Technology, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India Email: dharmesh.dhabliya@viit.ac.in
3 Associate Professor, Dept of CSE, Aditya Engineering College, Surampalem, India
4 Engineering Manager, Altimetrik India Pvt Ltd, Pune, Maharashtra, India Email: anishdhablia@gmail.com
5 Department of Artificial Intelligence & Data Science, Vishwakarma Institute of Information Technology, Pune, INDIA. Email: santosh.kumar@viit.ac.in
1 Corresponding author Email: dharmesh.dhabliya@viit.ac.in
It has become essential to protect vital infrastructures from cyber threats in an age where technology permeates every aspect of our lives. This article examines how machine learning and cybersecurity interact, providing a thorough overview of how this dynamic synergy might strengthen the defence of critical systems and services. The hazards to public safety and national security from cyberattacks on vital infrastructures including electricity grids, transportation networks, and healthcare systems are significant. Traditional security methods have failed to keep up with the increasingly sophisticated cyber threats. Machine learning offers a game-changing answer because of its ability to analyse big datasets and spot anomalies in real time. The goal of this study is to strengthen the defences of key infrastructures by applying machine learning algorithms, such as CNN, LSTM, and deep reinforcement learning for anomaly algorithm. These algorithms can anticipate weaknesses and reduce possible breaches by using historical data and continuously adapting to new threats. The research also looks at issues with data privacy, algorithm transparency, and adversarial threats that arise when applying machine learning to cybersecurity. For machine learning technologies to be deployed successfully, these obstacles must be removed. Protecting vital infrastructures is essential as we approach a day where connectivity is pervasive. This study provides a road map for utilising machine learning to safeguard the foundation of our contemporary society and make sure that our vital infrastructures are robust in the face of changing cyberthreats. The secret to a safer and more secure future is the marriage of cutting-edge technology with cybersecurity knowledge.
Key words: Machine Learning / Cybersecurity / Critical Infrastructures / CNN / LSTM
© The Authors, published by EDP Sciences, 2024
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.