Cybercrime has been on a massive increase for several years. As more individuals conduct business and live their lives online, more criminals are turning to the internet to steal. With the developments in cybersecurity, adoption of best practices, cybersecurity awareness initiatives, and increased regulations and partnerships between businesses and governments to resolve the problems, cybercriminals may be feeling the pressure. In this paper, we are going to predict operating system vulnerabilities using machine learning algorithms. And evaluate their accuracies through training them. The aim of the paper is to use Machine Learning algorithms to predict with accuracy operating systems vulnerabilities. Different ML algorithms have been analyzed, such as Logistic Regression, Support Vector Machine and Random Forest. And, out of all of these algorithms, Random Forest had the highest accuracy of 99.33%.
Skip Nav Destination
Article navigation
7 May 2024
INTERNATIONAL CONFERENCE ON ADVANCEMENT IN DESIGN, DEVELOPMENT, ENGINEERING, PROCESSING, AND CHARACTERIZATION: ADDEPC 2021
1–2 December 2021
Virtual Conference
Research Article|
May 07 2024
A prediction of operating systems vulnerabilities using machine learning algorithms
Komal Barge;
Komal Barge
a)
1
Department of Electronics and Telecommunication, Sardar Patel Institute of Technology
, Mumbai, India
a)Corresponding author: [email protected]
Search for other works by this author on:
Vijaya Kamble
Vijaya Kamble
1
Department of Electronics and Telecommunication, Sardar Patel Institute of Technology
, Mumbai, India
Search for other works by this author on:
a)Corresponding author: [email protected]
AIP Conf. Proc. 2853, 020247 (2024)
Citation
Komal Barge, Vijaya Kamble; A prediction of operating systems vulnerabilities using machine learning algorithms. AIP Conf. Proc. 7 May 2024; 2853 (1): 020247. https://doi.org/10.1063/5.0197770
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
37
Views
Citing articles via
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Students’ mathematical conceptual understanding: What happens to proficient students?
Dian Putri Novita Ningrum, Budi Usodo, et al.
Related Content
Risk-ranking matrix for security patching of exploitable vulnerabilities
AIP Conf. Proc. (May 2023)
Implementing vulnerability assessment and penetration testing in government websites to ensure web security from cyber attacks
AIP Conf. Proc. (July 2024)
An effectual mechanism for injected vulnerability scrutiny of web application using hybrid aco algorithm
AIP Conf. Proc. (August 2023)
A survey on cyber bulling predictive analysis on Twitter data with multi-model supervised technique
AIP Conf. Proc. (March 2025)
A study on cyber crimes, cyber attacks and prevention methods
AIP Conf. Proc. (March 2025)