Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Authors(2) :-Jithin Mathew, S. Ajikumar

An intrusion detection system is software that monitors a single or a network of computers for malicious activities that are aimed at stealing or censoring information or corrupting network protocols. Most technique used in today’s intrusion detection system are not able to deal with the dynamic and complex nature of cyber-attacks on computer networks. Even though efficient adaptive methods like various techniques of machine learning can result in higher detection rates, lower false alarm rates and reasonable computation and communication cost. With the use of data mining can result in frequent pattern mining, classification, clustering and mini data stream. This survey paper describes a focused literature survey of machine learning and data mining methods for cyber analytics in support of intrusion detection. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in machine learning and data mining approaches, some well-known cyber data sets used in machine learning and data mining are described for cyber security is presented, and some recommendations on when to use a given method are provided.

Authors and Affiliations

Jithin Mathew
Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli, Tamilnadu, India
S. Ajikumar
Department of M.Sc(Software Engineering), PSN College of Engineering & Technology, Tirunelveli, Tamilnadu, India

Local Area Network, Wide Area Network, Metropolitan Area Networks, Close Circuit Television, Security through Obscurity GPS, Global Positioning System, Point Of Access, Network Intrusion Detection System

  1. Zhenlong Li, Chaowei Yang, Baoxuan Jin, Manzhu Yu, Kai Liu, Min Sun, Matthew Zhan, "Enabling Big Geoscience Data Analytics with a Cloud-BasedMapReduce-Enabled and Service- Oriented Workflow Framework", Research Article, Plos One, DOI:10.1371/journal.pone.0116781 March 5, 2015
  2. Duffy DQ, Schnase JL, Thompson JH, Freeman SM, CluneTL,"Preliminary Evaluation of MapReduce for High- Performance Climate Data Analysis", NASA new technology report white paper, 2012.
  3. Santiago A.Nunes, Luciana A.S. Romani, Ana M.H. Avila, "Analysis of Large Scale Climate Data: How Well Climate Change Models and Data from Real Sensor Networks Agree?", 22nd international conference on world wide web,New York, USA, pp.517-526,ACM,ISBN:978-1-4503-2038-2,2013.
  4. Yang C, Goodchild M, Huang Q, Nebert D, Raskin R, "Spatial cloud computing: how can the geospatial sciences use and help shape cloud computing?", International Journal of Digital Earth, pp. 305-329,Vol. 4, No. 4, July 2011.
  5. Vatika Sharma, Meenu Dave, "SQL and NoSQLDatabases", International Journal of Advanced Research in Computer Science and Software Engineering,pp. 20-27, volume 2, Issue 8, august2012, ISSN:2277 128X.
  6. Songnian Li, SuzanaDragicevic ,FrancescAntón Castro , Monika Sester, Stephan Winter,ArzuColtekin, Christopher Pettit, "Geospatial big data handling theory and methods: A review and research challenges", ISPRS Journal of Photogrammetry and Remote Sensing, pp. 119–133, Volume 115, May 2016.
  7. Tong Zhang, Jing Li , Qing Liu , Qunying Huang, "Cloud- Enabled Remote Visualization Tool for Time Variant Climate Analytics", journal of Environmental Modelling&Software,Science Direct, pp. 513–518, Volume 75, January 201
  8. GemaBello-Orgaza,JasonJ.Jungb, DavidCamacho, "Social big data: Recent achievements and new challenges", Journal of Information Fusion, ScienceDirect, pp. 45–59,Volume 28, March 2016.
  9. Stefano Nativi , Paolo Mazzetti , Mattia Santoro , FabrizioPapeschi , Max Craglia ,Osamu Ochiai, "Big Data challenges in building the Global Earth Observation System of Systems", Journal of Environmental Modelling & Software,ScienceDirect,pp. 1–26, Volume 68, June 2015.
  10. Yu Zheng, "Methodologies for Cross-Domain Data Fusion: An Overview", IEEE Transactions on Big Data, pp. 16 – 34, Volume: 1, Issue: 1, TBD-2015-05-0037, March 2015.
  11. Yu Zheng, "Crowdsourcing geospatial data", ISPRS Journal of Photogrammetry and Remote Sensing, ScienceDirect,pp.550– 557, Volume 65, Issue 6, November 2010.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 92-97
Manuscript Number : CSEIT17229
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Jithin Mathew, S. Ajikumar, "Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.92-97, March-April-2017.
Journal URL :

Article Preview