MachineLearningforCyberSecurity De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences Edited by Mangey Ram Volume 15 Machine Learning for Cyber Security Edited by Preeti Malik, Lata Nautiyal and Mangey Ram Editors Dr.PreetiMalik GraphicEraUniversity CSITBlock BellRoad,ClementTown Dehradun248001 Uttarakhand India [email protected] [email protected] Dr.LataNautiyal UniversityofBristol MerchantVenturersBuilding WoodlandRoad Clifton BristolBS81UB GreatBritain [email protected] Prof.Dr.MangeyRam DepartmentofMathematics ComputerSciencesand Engineering GraphicEraUniversity 566/6BellRoad ClementTown,Dehradun248002 Uttarakhand India [email protected] ISBN978-3-11-076673-8 e-ISBN(PDF)978-3-11-076674-5 e-ISBN(EPUB)978-3-11-076676-9 ISSN2626-5427 LibraryofCongressControlNumber:2022942864 BibliographicinformationpublishedbytheDeutscheNationalbibliothek TheDeutscheNationalbibliothekliststhispublicationintheDeutscheNationalbibliografie; detailedbibliographicdataareavailableontheinternetathttp://dnb.dnb.de. ©2023WalterdeGruyterGmbH,Berlin/Boston Coverimage:MF3d/E+/GettyImages Typesetting:IntegraSoftwareServicesPvt.Ltd. Printingandbinding:CPIbooksGmbH,Leck www.degruyter.com Preface Cyber threats today are one of the expensive losses that an organization can face. Today,itisimpossibletodeployeffectivecybersecuritytechnologywithoutrelying heavilyonadvancedtechniqueslikemachinelearninganddeeplearning.Cyberse- curity is a growing challenge in the era of Internet. This book addresses questions ofhowmachinelearningmethodscanbeusedtoadvancecybersecurityobjectives, including detection, modeling, monitoring, and analysis of as well as defense againstvariousthreatstosensitivedataandsecuritysystems.Fillinganimportant gap between machine learning and cybersecurity communities, it discusses topics coveringawiderangeofmodernandpracticalmachinelearningtechniques,frame- works,anddevelopmenttoolstoenablereaderstoengagewiththecutting-edgere- search across various aspects of cybersecurity. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points. This cybersecuritybook presents and demonstrates popular and successful artificialintelligenceapproachesandmodelsthatyoucanadapttodetectpotential attacksandprotectyourcorporatesystems. This book will assist readers in putting intelligent answers to current cyberse- curity concerns into practice and in creating cutting-edge implementations that meetthedemandsofever-morecomplexorganizationalstructures.Bythetimeyou finish reading this book, you will be able to create and employ machine learning algorithmstomitigatecybersecurityrisks. https://doi.org/10.1515/9783110766745-202 Contents Preface V Listofcontributors IX Editor’sbiography XI PreetiMalik,VarshaMittal,MohitMittal,Kamika Differentialprivacy:asolutiontoprivacyissueinsocialnetworks 1 AbdulRahman,KrishnadasNanath CrackingCaptchausingmachinelearningalgorithms:anintersectionof CaptchacategoriesandMLalgorithms 27 KiranAswal,DineshC.Dobhal,UmeshK.Tiwari,HemanPathak Theransomware:anemergingsecuritychallengetothecyberspace 41 SamuelWedajKibret Property-basedattestationindeviceswarms:amachinelearning approach 71 SangeetaMittal Areviewofmachinelearningtechniquesincybersecurityandresearch opportunities 91 VasuThakur,VikasKumarRoy,NikhilBaliyan,NupurGoyal,RahulNijhawan AframeworkforseborrheickeratosisskindiseaseidentificationusingVision Transformer 117 PreetiMalik,AshwiniKumarSingh,RohitNautiyal,SwatiRawat MappingAICTEcybersecuritycurriculumontoCyBOK:acasestudy 129 Index 145 List of contributors 1.PreetiMalik 10.SamuelWedajKibret GraphicEraDeemedtobeUniversity, IndianInstituteofTechnologyDelhi, Dehradun,India NewDelhi,India Email:[email protected] Email:[email protected], [email protected] 2.VarshaMittal GraphicEraDeemedtobeUniversity, 11.SangeetaMittal Dehradun,India JaypeeInstituteofInformationTechnology, Email:[email protected] Noida,UttarPradesh,India Email:[email protected] 3.MohitMittal INRIALabs,France 12.VasuThakur Email:[email protected] DepartmentofComputerScienceand Engineering, 4.KamikaChaudhary RoorkeeInstituteofTechnology, MBGovt.PGCollege,Haldwani,India Roorkee,India Email:[email protected] 13.VikasKumarRoy 5.AbdulRahman DepartmentofComputerScienceand MiddlesexUniversityDubai,Dubai,UAE Engineering, RoorkeeInstituteofTechnology, 6.KrishnadasNanath Roorkee,India MiddlesexUniversityDubai,Dubai,UAE Email:[email protected] Email:[email protected] 14.NikhilBaliyan 7.KiranAswal DepartmentofComputerScienceand GurukulKangriViswavidyalaya, Engineering, DehradunCampus,Uttarakhand,India RoorkeeInstituteofTechnology,Roorkee, Email:[email protected] Uttarakhand,India 8.DineshC.Dobhal 15.NupurGoyal GraphicEraDeemedtobeUniversity, DepartmentofMathematics, Dehradun,Uttarakhand,India GraphicEraDeemedtobeUniversity, Email:[email protected] Dehradun,Uttarakhand, India 9.UmeshK.Tiwari E-mail:[email protected] GraphicEraDeemedtobeUniversity, Dehradun,Uttarakhand,India Email:[email protected] https://doi.org/10.1515/9783110766745-204 X Listofcontributors 16.RahulNijhawan 18.RohitNautiyal DepartmentofComputerScienceand UniversityofSurrey,Guildford, Engineering, UnitedKingdom UniversityofPetroleumandEnergyStudies, Dehradun,Uttarakhand,India 19.SwatiRawat E-mail:[email protected] QuantumUniversity,Roorkee, Uttarakhand,India 17.AshwiniKumarSingh Email:[email protected] DepartmentofInformatics,King’sCollege London,London,UnitedKingdom