Improving Distance Learning Security using Machine Learning

Authors

  • Asiyah Ahmad Mojatecs IT Solutions

Keywords:

Machine Learning, Distance Learning Security, Cybersecurity, Predictive Capabilities, Ethical Implementation

Abstract

This study explores the intersection of machine learning and distance learning security, aiming to fortify online educational platforms amidst the evolving digital landscape. With technological advancements fueling the rise of distance learning, concerns regarding cybersecurity in virtual educational environments have grown significantly. The fusion of machine learning and distance learning security represents a proactive approach to bolstering safety and integrity within virtual classrooms. Leveraging sophisticated algorithms, this amalgamation seeks to preempt security breaches by identifying irregular patterns, addressing vulnerabilities, and swiftly countering risks like phishing attempts and data breaches. By utilizing historical data and real-time monitoring, machine learning models offer predictive capabilities, enabling educational institutions to anticipate emerging threats and safeguard the learning process while ensuring data integrity and user privacy. While machine learning techniques, such as anomaly detection and predictive modeling, have shown promise in fortifying security measures, ethical considerations and collaborative efforts are essential for responsible implementation. This comprehensive study, involving literature review, knowledge enrichment, case studies, and informed conclusions, aims to guide further research and practical applications in enhancing distance learning security through machine learning.

Downloads

Download data is not yet available.

References

J. Petchamé, I. Iriondo, O. Korres, and J. Paños-Castro, “Digital transformation in higher education: A qualitative evaluative study of a hybrid virtual format using a smart classroom system,” Heliyon, vol. 9, no. 6, 2023, doi: 10.1016/j.heliyon.2023.e16675.

F. Wang and F. Wang, “ScienceDirect Available ScienceDirect ScienceDirect Remote Data Security Monitoring Technology for Computer Remote Data Security Monitoring Technology for Computer Networks Based on Machine Learning Algorithms Networks Based on Machine Learning Algorithms,” Procedia Comput. Sci., vol. 228, pp. 325–332, 2023, doi: 10.1016/j.procs.2023.11.037.

G. Paulson, “Assessing data phishing risks associated with unencrypted apps on smartphones with non-parametric test and random forest model: Insights from Kuwait phishing scam calls,” J. Eng. Res., no. May, 2023, doi: 10.1016/j.jer.2023.09.017.

D. D. Shankar, A. S. Azhakath, N. Khalil, S. J., M. T., and S. K., “Data mining for cyber biosecurity risk management – A comprehensive review,” Comput. Secur., vol. 137, no. November 2023, 2024, doi: 10.1016/j.cose.2023.103627.

M. Guarascio, N. Cassavia, F. S. Pisani, and G. Manco, “Boosting Cyber-Threat Intelligence via Collaborative Intrusion Detection,” Futur. Gener. Comput. Syst., vol. 135, pp. 30–43, 2022, doi: 10.1016/j.future.2022.04.028.

L. Mascali et al., “A machine learning-based Anomaly Detection Framework for building electricity consumption data,” Sustain. Energy, Grids Networks, vol. 36, no. August, p. 101194, 2023, doi: 10.1016/j.segan.2023.101194.

B. Denkena, M. Wichmann, H. Noske, and D. Stoppel, “Boundary conditions for the application of machine learning based monitoring systems for supervised anomaly detection in machining,” Procedia CIRP, vol. 118, pp. 519–524, 2023, doi: 10.1016/j.procir.2023.06.089.

S. K. Khan, N. Shiwakoti, P. Stasinopoulos, and M. Warren, “Cybersecurity regulatory challenges for connected and automated vehicles – State-of-the-art and future directions,” Transp. Policy, vol. 143, no. July, pp. 58–71, 2023, doi: 10.1016/j.tranpol.2023.09.001.

P. Krishna Kishore, S. Ramamoorthy, and V. N. Rajavarman, “ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach,” Int. J. Intell. Networks, vol. 4, no. October 2022, pp. 38–45, 2023, doi: 10.1016/j.ijin.2022.12.001.

X. Tao, Y. Yu, L. Fu, J. Liu, and Y. Zhang, “An insider user authentication method based on improved temporal convolutional network,” High-Confidence Comput., vol. 3, no. 4, p. 100169, 2023, doi: 10.1016/j.hcc.2023.100169.

K. N. Prashanth Kumar, B. T. Harish Kumar, and A. Bhuvanesh, “Spectral clustering algorithm based web mining and quadratic support vector machine for learning style prediction in E-learning platform,” Meas. Sensors, vol. 31, no. November 2023, p. 100962, 2024, doi: 10.1016/j.measen.2023.100962.

M. H. Junejo, A. A. H. Ab Rahman, R. A. Shaikh, K. M. Yusof, D. Kumar, and I. Memon, “Lightweight Trust Model with Machine Learning scheme for secure privacy in VANET,” Procedia Comput. Sci., vol. 194, pp. 45–59, 2021, doi: 10.1016/j.procs.2021.10.058.

M. Aljabri and R. M. A. Mohammad, “Click fraud detection for online advertising using machine learning,” Egypt. Informatics J., vol. 24, no. 2, pp. 341–350, 2023, doi: 10.1016/j.eij.2023.05.006.

K. Nanath and L. Olney, “An investigation of crowdsourcing methods in enhancing the machine learning approach for detecting online recruitment fraud,” Int. J. Inf. Manag. Data Insights, vol. 3, no. 1, p. 100167, 2023, doi: 10.1016/j.jjimei.2023.100167.

R. Bemthuis, W. Wang, M. E. Iacob, and P. Havinga, “Business rule extraction using decision tree machine learning techniques: A case study into smart returnable transport items,” Procedia Comput. Sci., vol. 220, pp. 446–455, 2023, doi: 10.1016/j.procs.2023.03.057.

Published

2023-07-31

How to Cite

Ahmad, A. (2023). Improving Distance Learning Security using Machine Learning. Journal of Computer Science Application and Engineering (JOSAPEN), 1(2), 39–43. Retrieved from https://journal.lenterailmu.com/index.php/josapen/article/view/13

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.