A Survey : Data Mining and Machine Learning Methods for Cyber Security
Keywords:
Machine Learnings, Data Mining, Cyber Security, Novel (Zero-Day) AttacksAbstract
This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods. Short ML/DM method tutorial details will be given. Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method. Since data is so important.
References
- A. Mukkamala, and A. Sung, and A. Abraham, “Cyber security challenges: designing efficient intrusion detection systems and antivirus tools,” Vemuri, V. Rao, Enhancing Computer Security with Smart Technology. (Auerbach, 2006) (2005), pp. 125–163
- M. Bhuyan, D. Bhattacharyya, and J. Kalita, “Network anomaly detection: Methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. PP, no. 99, 2013, pp. 1–34
- E.E. Schultz Where have the worms and viruses gone? New trends in malware Comput. Fraud Secur., 2006 (7) (2006), pp. 4-8
- U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, C. Kruegel, A view on current malware behaviours, in: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2009.
- G. Cluley Sizing up the malware threat-key malware trends for 2010 Netw.Secur. (2010), 10.1016/S1353-4858(10)70045-3
- L.F. Cranor, S. Garfinkel Secure or usable? IEEE Secur. Priv., 2 (2004), pp. 16-18
- Anti phishing group tech reports: http://www.antiphishing.org/phishReportsArchive.html,lastaccessed:June2013.
- K. Thomas, D. M. Nicol, The Koobfacebotnet and the rise of social malware, in : Proceeding softhe 5th International Conferenceon Maliciousand Unwanted Software (Malware2010), 2010, pp. 63–70.
- W.Luo, J. Liu, J. Liu, C. Fan, Ananalysis of security in social networks, in: Eighth IEEE International Conferenceon Dependable, Autonomic and Secure Computing, 2009, pp. 648–651
- M. Lucas, N. Borisov, Flybynight : Mitigating the privacy risks of socialnetworking, in: WPES,2008.
- L. Fang, K. LeFevre, Privacywizards for social networking sites, in : Proc. WWW’10,pp.351–360.
- A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," in IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, Secondquarter 2016, doi: 10.1109/COMST.2015.2494502.
- A. Siffer, P. -A. Fouque, A. Termier and C. Largouet, "Netspot: A Simple Intrusion Detection System with Statistical Learning," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 2020, pp. 911-918, doi: 10.1109/TrustCom50675.2020.00122.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.