Analysis of the contribution of machine learning to information security

Authors

  • Juan Fernando Correa Wachter Corporación Universitaria Americana
  • Cesar Felipe Henao Villas Corporación Universitaria Americana
  • Federico Henao Villa Corporación Universitaria Americana
  • David Alberto David Alberto Corporación Universitaria Americana

DOI:

https://doi.org/10.21803/ingecana.1.1.407

Keywords:

Artificial Intelligence, Data Science, Deep Learning, Machine Learning, Technology, Security

Abstract

Every computing device has its own security logs. By
aggregating thousands of devices that intervene in the
communications of personal computers, databases, web
servers, network devices, firewalls, etc., a large volume of
logs is generated with interesting information from the
security point of view, although impossible to review by a
human. That is where it has automated tools with a certain
intelligence capable of performing analyzes and detecting
malicious patterns that can affect the confidentiality,
integrity and availability of information.
Among these tools arise Artificial Intelligence and Machine
Learning, which are being included by manufacturers in
the latest generation security products. The objective of
this article is to explain what Machine Learning consists of,
its history, components and its contribution in support of
information security.

Downloads

Download data is not yet available.

References

C. H. Tarazona, «Amenazas informáticas y Seguridad de la información,» DerecPenalyCriminXXIX, 2007.

R. Duda, P. Hart y D. Stork, Pattern classification, New York: Wiley & Sons, 2001.

P. Domingos, The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World (Ed. rev.), New York: Basic Books, 2015.

J. Brownlee, A tour of Machine Learning Algorithms, Melbourne: Jason Brownlee, 2013.

I. Witten, E. Frank y M. Hall, Data mining, Bunlington: Morgan Kaufmann Publishers, 2011.

M. Mohri, A. Rostamizadeh y A. Talwalkar, Foundations of machine learning, Cambridge: MIT Press, 2012.

L. C. Arciniégas C, M. Á. Camacho O, E. L. Duarte F, y A. Naranjo L., «Medición del desempeño de la red de suministros de medicamentos en un hospital público de tercer nivel en la ciudad de Bogotá, a través del cuadro de mando integral», ingeniare, n.º 20, pp. 75–90, dic. 2016.

Downloads

Published

2021-11-30

Issue

Section

Artículos de Investigación

How to Cite

[1]
J. F. . Correa Wachter, C. F. . Henao Villas, F. . Henao Villa, and D. A. David Alberto, “Analysis of the contribution of machine learning to information security”, iname, vol. 1, no. 1, pp. 9–20, Nov. 2021, doi: 10.21803/ingecana.1.1.407.