A Survey : Data Mining and Machine Learning Methods for Cyber Security

Authors

  • Ashish Prajapati  M.Tech Scholar, School of Research & Technology People's University, Bhopal, Madhya Pradesh, India
  • Shital Gupta  Assistant Professor, School of Research & Technology People's University, Bhopal, Madhya Pradesh, India

Keywords:

Machine Learnings, Data Mining, Cyber Security, Novel (Zero-Day) Attacks

Abstract

This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods. Short ML/DM method tutorial details will be given. Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method. Since data is so important.

References

  1. A. Mukkamala, and A. Sung, and A. Abraham, “Cyber security challenges: designing efficient intrusion detection systems and antivirus tools,” Vemuri, V. Rao, Enhancing Computer Security with Smart Technology. (Auerbach, 2006) (2005), pp. 125–163
  2. M. Bhuyan, D. Bhattacharyya, and J. Kalita, “Network anomaly detection: Methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. PP, no. 99, 2013, pp. 1–34
  3. E.E. Schultz Where have the worms and viruses gone? New trends in malware Comput. Fraud Secur., 2006 (7) (2006), pp. 4-8
  4. U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, C. Kruegel, A view on current malware behaviours, in: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2009.
  5. G. Cluley Sizing up the malware threat-key malware trends for 2010 Netw.Secur. (2010), 10.1016/S1353-4858(10)70045-3
  6. L.F. Cranor, S. Garfinkel Secure or usable? IEEE Secur. Priv., 2 (2004), pp. 16-18
  7. Anti phishing group tech reports: http://www.antiphishing.org/phishReportsArchive.html,lastaccessed:June2013.
  8. K. Thomas, D. M. Nicol, The Koobfacebotnet and the rise of social malware, in : Proceeding softhe 5th International Conferenceon Maliciousand Unwanted Software (Malware2010), 2010, pp. 63–70.
  9. W.Luo, J. Liu, J. Liu, C. Fan, Ananalysis of security in social networks, in: Eighth IEEE International Conferenceon Dependable, Autonomic and Secure Computing, 2009, pp. 648–651
  10. M. Lucas, N. Borisov, Flybynight : Mitigating the privacy risks of socialnetworking, in: WPES,2008.
  11. L. Fang, K. LeFevre, Privacywizards for social networking sites, in : Proc. WWW’10,pp.351–360.
  12. A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," in IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, Secondquarter 2016, doi: 10.1109/COMST.2015.2494502.
  13. A. Siffer, P. -A. Fouque, A. Termier and C. Largouet, "Netspot: A Simple Intrusion Detection System with Statistical Learning," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 2020, pp. 911-918, doi: 10.1109/TrustCom50675.2020.00122.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Ashish Prajapati, Shital Gupta, " A Survey : Data Mining and Machine Learning Methods for Cyber Security " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.24-34, March-April-2021.