Machine Learning confronted with the operational constraints of detection systems

Authors

  • Sridarala ramu Vardhaman College of Engineering

DOI:

https://doi.org/10.52502/ijitas.v1i1.6

Keywords:

Big Data, Machine Learning, ML, Model ML, AI, artificial intelligence

Abstract

Intrusion detection systems, traditionally based on signatures, have not escaped the recent appeal of machine learning techniques. While the results presented in academic research articles are often excellent, security experts still have many reservations about the use of Machine Learning in intrusion detection systems. They generally fear an inadequacy of these techniques to operational constraints, in particular because of a high level of expertise required, or a large number of false positives. In this article, we show that Machine Learning can be compatible with the operational constraints of detection systems. We explain how to build a detection model and present good practices to validate it before it goes into production. The methodology is illustrated by a case study on the detection of malicious PDF files and we offer a free tool, SecuML, to implement it.

Downloads

Published

2019-12-29

How to Cite

[1]
S. ramu, “Machine Learning confronted with the operational constraints of detection systems”, IJITAS, vol. 1, no. 1, pp. 1–7, Dec. 2019.