Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning
DOI:
https://doi.org/10.3991/ijim.v18i10.46485Keywords:
Mobile Security, Machine Learning in Cybersecurity, Intelligent Attack Detection, Adversarial Attacks and DefensesAbstract
In light of the increasing sophistication and frequency of mobile attacks, there is a growing demand for advanced intelligent techniques capable of offering comprehensive mobile attack detection and prevention. This paper aims to critically evaluate the landscape of mobile security, outlining the evolution of mobile attack vectors and pinpointing the deficiencies in traditional security methods. The text embarks on a journey to understand the connection between machine learning (ML) and its promising applications in enhancing mobile security. First, we outline the current state of mobile attacks and the traditional methods used for their detection, emphasizing the clear limitations and the necessity for an innovative approach. Following this, we will elucidate the fundamentals of ML and its implications in cybersecurity, exploring the benefits it can provide to mobile attack detection frameworks. We delve into discussing various ML algorithms, such as decision trees, random forests, and support vector machines, highlighting their effectiveness and the metrics used to evaluate ML models in security tasks. Moreover, the paper sheds light on novel approaches such as semi-supervised and unsupervised learning in anomaly detection, as well as the applications of transfer learning in security. Addressing the pressing challenges faced in artificial intelligence (AI)-driven mobile attack detection, we delve deep into the intricacies of data collection, labeling, and the prevailing issues of imbalance and overfitting. Furthermore, we explore contemporary adversarial attacks and defenses, scrutinizing the real-world adaptability of AI models and the pivotal role of human-AI collaboration in enhancing attack detection mechanisms.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ahmad k. AL Hwaitat, Hussam N. Fakhouri
This work is licensed under a Creative Commons Attribution 4.0 International License.