Application of Machine Learning Classification Algorithm to Cybersecurity Awareness

Shilpa Balan, Sanchita Gawand, Priyanka Purushu

Abstract


Cybersecurity plays a vital role in protecting the privacy and data of people. In the recent times, there have been several issues relating to cyber fraud, data breach and cyber theft. Many people in the United States have been a victim of identity theft. Thus, understanding of cybersecurity plays an important role in protecting their information and devices. As the adoption of smart devices and social networking are increasing, cybersecurity awareness needs to be spread. The research aims at building a classification machine learning algorithm to determine the awareness of cybersecurity by the common masses in the United States. We were able to attain a good F-measure score when evaluating the performance of the classification model built for this study.


Keywords:

Big data; cybersecurity; classification; Machine learning

Full Text:

PDF

References


R. von Solms and J. van Niekerk, “From Information Security to Cyber Security,” Computers & Security, vol. 38, pp. 97–102, Oct. 2013. https://doi.org/10.1016/j.cose.2013.04.004

K. Olmstead, A. Smith, “What the Public knows about Cybersecurity”, Pew Research Center, Washington, D.C., 2017 [Online]. Available: http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/

R. Damodaram, “Study on Phishing Attacks and Phishing Tools”, International Research Journal of Engineering and Technology, vol. 3, no. 1, pp. 700–705, 2016.

D. Fagella, “What is Machine learning”, 2018 [Online]. Available: https://www.techemergence.com/what-is-machine-learning/

R. Koppula, “Applications of machine learning in cyber security”, 2018 [Online]. Available: https://apiumhub.com/tech-blog-barcelona/applications-machine-learning-cyber-security/

I. Witten, E. Frank, L. Trigg, M. Hall, G. Holmes, S. Cunningham, “Weka: Practical Machine Learning Tools and Techniques with Java Implementations”, ICONIP/ANZIIS/ANNES, 2002.

Wombat Security, “Wombat Study Reveals Personal Security Habits of 2,000 US, UK Workers”, 2017 [Online]. Available: https://www.wombatsecurity.com/press/press-releases/wombat-study-reveals-personal-security-habits-2000-us-uk-workers

Crediful, “Equifax Data Breach of 143 Million People: What it means for You”, 2017 [Online]. Available: https://www.crediful.com/equifax-data-breach/

S. Ragan, “Anthem confirms data breach, but full extent remains unknown”, 2015 [Online]. Available: https://www.csoonline.com/article/2880352/disaster-recovery/anthem-confirms-data-breach-but-full-extent-remains-unknown.html

J. Ribeiro, “Target customers' card data said to be at risk after store thefts”, 2013 [Online]. Available: https://www.csoonline.com/article/2134248/data-protection/target-customers--39--card-data-said-to-be-at-risk-after-store-thefts.html

Gonzalez, F., Dasgupta, D., Kozma, R. (2002). Combining Negative Selection and Classification Techniques for Anomaly Detection. Proceedings of the 2002 Congress on Evolutionary Computation, IEEE, pp. 705–710. https://doi.org/10.1109/CEC.2002.1007012

Weka, “Weka: Data Mining Software in Java”, 2018 [Online]. Available: https://www.cs.waikato.ac.nz/ml/weka/

N. Landwehr, M. Hall, E. Frank, “Logistic Model Trees”, Machine Learning, vol. 59, pp. 161–205, 2005. https://doi.org/10.1007/s10994-005-0466-3

S. Balan, J. Otto, E. Minasian, A. Aryal, “Data Analysis of Cybercrimes in Businesses”, Information Technology and Management Science, vol. 20, no. 1, pp. 64–68, 2017. https://doi.org/10.1515/itms-2017-0011




DOI: 10.7250/itms-2018-0006

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Shilpa Balan, Sanchita Gawand, Priyanka Purushu

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.