Claim Missing Document
Check
Articles

Found 1 Documents
Search

Learning Cyber ​​Security and Machine Engineering at the University Karuniawan, Rickho Rizky; Santoso, Sugeng; Fikri, Muhamad Al; Argadilah, M.; Pamungkas, Wisnu Ardi
Blockchain Frontier Technology Vol. 3 No. 1 (2023): Blockchain Frontier Technology
Publisher : IAIC Bangun Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/bfront.v3i1.242

Abstract

In this review, key literature reviews on network analysis and intrusion detection using machine learning (ML) and deep learning (DL) approaches are explained. It also provides a brief lesson description for each ML/DL procedure. This paper covers the datasets used in machine learning techniques, which are the main instruments for evaluating network traffic and detecting irregularities. Data holds a key role in ML/DL approaches. We also go into further detail about the problems with using ML/DL to cybersecurity and make suggestions for future research.