Machine learning algorithm for Cyber Security - A Review

Authors

  • Mohammad Asif  Computer Science and Engineering, S.Y.C.E.T. Aurangabad, BATU, Lonere, Maharashtra, India
  • Pratap M. Mohite  Computer Science and Engineering, S.Y.C.E.T. Aurangabad, BATU, Lonere, Maharashtra, India
  • Prof. P. D. Satya  Computer Science and Engineering, S.Y.C.E.T. Aurangabad, BATU, Lonere, Maharashtra, India

Keywords:

Keywords: IDS (Intrusion Detection System), HIDS (Host Based Intrusion Detection System), ML(Machine Learning), NIDS(Network Based Intrusion Detection System)

Abstract

The computer networks are exposed to increasingly safety threats. With new kinds of attacks appearing usually, growing flexible and adaptive protection-oriented strategies is a severe undertaking. In this context, anomaly-primarily based community intrusion detection techniques are a precious era to guard target structures and networks in opposition to malicious sports. Threats the internets are posing higher threat on IDS safety of statistics. The primary concept is to utilize auditing programs to extract an in-depth set of capabilities that describe each network connection or host session and practice statistics mining applications to learn rules that correctly capture the behavior of intrusions and normal activities. Now Intrusion Detection has end up the priority and on the crucial assignment of statistics protection administrators. A device deployed in a network is at risk of numerous assaults and desires to be blanketed towards assaults. Intrusion detection machine is a necessity of these days’ information safety area. It performs a vital function in detection of anomalous site visitors in a community and indicators the network administrators to manage such visitors. The painting supplied in this thesis is an attempt to locate such visitor’s anomalies in the networks through generating and reading the site visitors float information.

References

  1. Adaptive Network Security: Solutions for Managing Risk in an Interconnected World, AberdeenGroup, Vol. 11, No. 5, January 1998.
  2. Hacker Stoppers? -- Companies Bought $65 Million Worth Of Network-Intrusion Tools Last Year, But Capabilities Still Lag What's Promised, Information Week, April 1998 http://www.techweb.com/se/directlink.cgi?IWK19980420S0066
  3. Adaptive Network Security Management: Intrusion Detection and Security Assessment Come of Age, The Yankee Group Data Communications Report, Vol. 13, No, 10, June 1998.
  4. Mark Crosbie and Gene Spafford. Active defense of a computer system using autonomous agents. Technical Report 95-008, COAST Group, Departmentof Computer Sciences, Purdue University,West Lafayette, IN 47907-1398, Feb 1995.
  5. Kumar S, Spafford EH (1994) An Application ofPattern Matching in Intrusion Detection. TechnicalReport CSD-TR-94-013. Purdue University.
  6. S. Staniford-Chen, S. Cheung, R. Crawford,M. Dilger, J. Frank, J. Hoagland, K. Levitt,C. Wee, R. Yip, and D. Zerkle. GrIDS: A graphbased intrusion detection system for large networks.In Proceedings of the 19th National InformationSystems Security Conference, volume 1, pages 361-370. National Institute of Standardsand Technology, October 1996.
  7. Gregory B. White, Eric A. Fisch, and Udo W.Pooch. Cooperating security managers: A peer basedintrusion detection system. IEEE Network, pages 20-23, January/February 1996.
  8. Intrusion Detection System by using K-Means Clustering, C 4.5, FNN, SVM Classifier Akshay Takke1, Ravikumar Gujjul2, Mikhil Ghag3 , Vivek Pawar4, Vivek Pandey5 Page no:-636
  9. International Journal of Advanced Research in Computer Science REVIEW PAPER Available Online at www.ijarcs.info© 2015-19, IJARCS All Rights Reserved 356 ISSN No. 0976-5697INTRUSION DETECTION SYSTEMS: A REVIEW D. Ashok Kumar,S. R. Venugopalan Page no:- [356-357]
  10. Patcha, A. and Park, J. M. An overview of anomaly detection techniques: Existing solutions and latest technological trends.Computer Networks, 51(12);2007; 3448–3470.
  11. Forrest, S., Hofmeyr, S. A. , Somayaji, A. and Longstaff, T. A. A Sense of Self for Unix Processes, IEEE Symposium onResearch in Security and Privacy, Oakland, CA, USA, 1996;120--128.
  12. Duan, Z., Chen, P., Sanchez, F., Dong, Y., Stephenson, M. and J. M. Barker, M. (2012). Detecting spam zombies bymonitoring outgoing messages, IEEE Trans. Dependable and Secure Computing, Apr 2012; 9(2):198–210
  13. Gu, G., Porras, P., Yegneswaran V., Fong, M. and Lee, W. BotHunter: detecting malware infection through IDS-drivenialog correlation, Proc. of 16th USENIX Security Symp. (SS ’07), Aug. 2007; 12:1–12:16.
  14. Gu, G., Zhang, J. and Lee, W. (2008). BotSniffer: detecting botnet command and control channels in network traffic, Proc. Of15th Ann. Network and Distributed Sytem Security Symp. (NDSS ’08),
  15. Goyal, A. and Kumar, C. .GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, Electrical Engineering and Computer Science, North West University, Technical Report;2008.Feb. 2008.
  16. Abdullah, B., Abd-algafar I., Salama G. I. and Abd-alhafez A. Performance Evaluation of a Genetic Algorithm BasedApproach to Network Intrusion Detection System, Proceedings of 13th International Conference on Aerospace Sciences andAviation Technology (ASAT-13), Military Technical College, Cairo, Egypt, 2009;1-5.
  17. Ojugo, A. A., Eboka, A. O., Okanta, O. E., Yora, R. E. and Aghware, F. O.Genetic Algorithm Rule-Based IntrusionDetection System (GAIDS), Journal of Emerging Trends in Computing and Information Sciences, 3(8);2012; 1182 – 1194.
  18. Roshani Gaidhane, Vaidya, C. and Raghuwanshi, M. Survey.Learning Techniques for Intrusion Detection System (IDS),International Journal of Advance Foundation and Research in Computer (IJAFRC) Feb 2014. ISSN 2348 – 4853, 2014;1(2).
  19. Gaikwad, Sonali Jagtap, D.P. Kunal Thakare and Vaishali Budhawant. Anomaly Based Intrusion Detection System UsingArtificial Neural Network and fuzzy clustering., International Journal of Engineering Research & Technology (IJERT), ISSN:2278-0181, November- 2012; 1(9).
  20. L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A Network SecurityMonitor. In Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1990.
  21. R. Heady, G. Luger, A. Maccabe, and M. Servilla. The Architecture of a Network Level Intrusion Detection System. Technical report, University of New Mexico, Department of Computer Science, August 1990.
  22. Judith Hochberg, Kathleen Jackson, Cathy Stallings, J. F. McClary, David DuBois, and Josephine Ford. NADIR: An automated system for detecting network intrusion and misuse. Computers and Security, 12(3):235-248, May 1993.
  23. S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal, and D. Mansur. DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an early Prototype. In Proceedings of the 14th National Computer Security Conference, pages 167-176, October 1991.
  24. Biswanath Mukherjee, Todd L. Heberlein, and Karl N. Levitt. Network intrusion detection. IEEE Network, 8(3):26-41, May/June 1994.
  25. Thomas H. Ptacek and Timothy N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
  26. S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle. GrIDS: A graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, volume 1, pages 361-370. National Institute of Standards and Technology, October 1996.
  27. Gregory B. White, Eric A. Fisch, and Udo W. Pooch. Cooperating security managers: A peer based intrusion detection system. IEEE Network, pages 20-23, January/February 1996.
  28. Review Paper on Shallow Learning and Deep Learning Methods for Network security Afzal Ahmad1*, Mohammad Asif2, Shaikh Rohan Ali 3 (page: -52) 2018
  29. Youssef Ahmed and Ahmed Emam, “Network Intrusion Detection Using Data Mining and Network Behavior Analysis”, International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011.
  30. X. Wu, V.Kumar, Ross Quinlan, Joydeep Ghosh, Qiang Yang, Hiroshi Motoda, Geoffrey J. McLachlan, Angus Ng, Bing Liu, Philip S. Yu, Zhi-Hua Zhou, Michael Steinbach, David J. Hand, and Dan Steinberg, “Top 10 algorithms in data mining”, Survey Paper(2008).
  31. Intrusion Detection Based On Clustering Algorithm Nadya El MOUSSAID 1, Ahmed TOUMANARI 2, Maryam ELAZHARI 3 Page-1062
  32. P. S. Rath, M. Hohanty, S. Acharya and M. Aich, “Optimization of IDS Algorithms Using Data Mining Technique”, Proceeding of 53rd IRF International Conference, Pune, India,ISBN 978-93-86083-01-2, 2016.
  33. L.S. Parihar and A. Tiwari, “Survey on Intrusion Detection Usingn Data Mining Methods”,IJSART, , Volume-2 Issue-1 ISSN (online: 2395-1052) January-2016.

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Mohammad Asif, Pratap M. Mohite, Prof. P. D. Satya, " Machine learning algorithm for Cyber Security - A Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.535-545, January-February-2019.