jarkom scripts
jarkom scripts
Today, almost every aspect of our lives relies on technology and computer networks, from communication, financial
transactions, to data security.
Machine Learning (ML) helps computers recognize patterns from huge amounts of data, allowing them to make
decisions without having to be programmed directly.
When ML is applied to computer networks, we can get smarter systems in detecting security threats and increasing
efficiency in various industries.
2. Increasingly Sophisticated Threats: Attacks like SQL Injection and DDoS can lead to data leaks or make systems
inaccessible.
ML can learn from previous attack patterns to recognize and block new ones.
Systems can respond to threats automatically, without the need for direct human intervention.
Simple Example:
Imagine a home security system that can distinguish between a regular guest and a suspicious person based on
movement patterns and facial expressions. This system is similar to how ML works to detect attacks on computer
networks.
3. the research method by using: the first Literature Review: Collecting and analyzing the latest research from various
scientific sources such as ScienceDirect, Scopus, and ACM Digital Library (between two thousand twenty and two
thousand twenty four).
then the second Case Study: Testing how ML can detect attacks such as SQL Injection and DDoS.
and the last ML Workflow: Developing step-by-step stages to apply ML in computer networks.
4. DDoS Detection with Hybrid ML Models has Improved Accuracy and Network Advantage.
The solution with ML is to use a combination of two techniques (Naïve Bayes and Random Forest) to improve
detection accuracy.
As a result, the system can distinguish between normal traffic and attacks with almost one hundred percent
accuracy
Then a Better Distributed Network because, the system can learn from various data sources around the world, so it
can recognize new attack patterns faster.
6. Risk Management in Industry (four zero points) there are Collaborative Framework, Anomaly Monitoring, and
Federated Learning.
ML helps detect Anomalies If there is unusual sensor data, the system can give alerts faster.
then in Federated Learning, ML Models can learn from many data sources without having to collect all the data in
one place, making it safer and more privacy-preserving.
The advantage is that response time to threats can be accelerated by up to (sixty five percent).
8. In conclusion, Enhanced Threat Detection with ML helps detect attacks faster and more accurately. then, Proactive
Vulnerability Mitigation is where the System can identify and fix weaknesses before they are exploited.
and finally Resilient Industry Framework with the combination of computer networks and ML creates a more robust
system in the face of modern threats.
9. Next, the Future Direction or what technology is being developed, namely: there is Federated Learning, by
Increasing data security by training ML models without collecting data in one place. Next, 5G Integration, by
Leveraging high speed and low latency to support real-time ML applications. Finally, Human-in-the-Loop Systems,
by Combining ML intelligence with human expertise to make the system more accurate and not completely
dependent on machines.
That's all the journal presentations from group five, wassalmualaikum warahmatullahi wabarakatuh