SR-MLC: Machine Learning Classifiers in Cyber Security-An Optimal Approach

Main Article Content

Anil Lamba

Abstract

The Digital flexibility is a quickly developing perspective that is accomplishing acknowledgment. Negative Cyber-assaults are those that oppositely impact the accessibility, uprightness or secrecy of IT arrange frameworks and related administrations and data. Earlier research works have carried on information control by an adversary as a worry, yet their works neglected to sum up the experiments. Many focused on formulating assault vectors inverse to explicit AI calculations and applications, for example, the Support Vector Machine (SVM) classifier. In our proposed work, an autonomous methodology on flexibility assessment and the development of enemy versatile classifiers utilizing Cluster Tree Map (CTM) Algorithm is finished. All information types in the area of Cyber Network information investigation are focused. The goal is to make a familiarity with any such strategy able to do effectively demonstrating the innovativeness and expertise of digital assailants and in this manner creating solo learning model. Better expected precision is achieved by utilizing Scalable Resilience Machine Learning Classifiers (SR-MLC).


Keywords: Resilience, Cluster, Classifiers, Cyber attackers Resilience, Cluster, Cloud, Cyber Security, Artificial Intelligence, Machine Learning, Network, Network Security, Analytics.


 

Article Details

How to Cite
Lamba, A. (2019). SR-MLC: Machine Learning Classifiers in Cyber Security-An Optimal Approach. International Journal of Research in Informative Science Application & Techniques (IJRISAT), 3(2), 75–84. https://doi.org/10.46828/ijrisat.v3i2.75
Section
Articles
Author Biography

Anil Lamba, Department of Computer Science, Charisma University, Turk and Caicos Islands

Dr. Anil Lamba is a cyber-security and technology risk specialist with proven success in managing information security risks, spearheading strategic information security programs to strengthen technology security controls across the enterprise. Throughout his career, he has parlayed his extensive background in security and technical knowledge to help clients understand cyber security related risks and changed the way they approach security to best protect their organization, employees, and customers.