IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey On Machine Learning For Cyber Security

[Full Text]

 

AUTHOR(S)

A. Lakshmanarao, M. Shashi

 

KEYWORDS

Cybersecurity, Malware detection, Machine learning, Deep learning.

 

ABSTRACT

Cyber crime is proliferating everywhere exploiting every kind of vulnerability to computing environment. Ethical Hackers pay more attention towards assessing vulnerabilities and recommending mitigation methodologies. The development of effective techniques has been an urgent demand in the field of the cybersecurity community. Machine Learning for cybersecurity has become an issue of great importance recently due to the effectiveness of machine learning and deep learning in cybersecurity issues. Machine learning techniques have been applied for major challenges in cybersecurity issues like intrusion detection, malware classification and detection, spam detection and phishing detection. Although machine learning cannot automate a complete cybersecurity system, it helps to identify cyber-security threats more efficiently than other software-oriented methodologies, and thus reduces the burden on security analysts. Ever evolving nature of cyber threats throws challenges continuously on the researchers to explore with the ideal combination of deep expertise in cybersecurity and in data science. In this paper, we present the current state of art machine learning applications and their potential for cybersecurity. An analysis of machine learning algorithms for most common types of cybersecurity threats is presented.

 

REFERENCES

[1] William G Hatcher, Wei Yu, “A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends”, IEEE Access 2018, Volume: 6, DOI:10.1109/ACCESS.2018.2830661.
[2] Venkatesh Jaganathan, Premapriya Muthu Sivashanmugam, Priyesh Cherurveettil, “Using a Prediction Model to Manage Cyber Security Threats”, Hindawi Publishing Corporation the Scientific World Journal Volume 2015, Article ID 703713, http://dx.doi.org/10.1155/2015/703713.
[3] Daria Lavrova, Alexander Pechenkin,” Applying Correlation and Regression Analysis to Detect Security Incidents in the Internet of Things”, International Journal of Communication Networks and Information Security (IJCNIS), Volume. 7, No. 3, December 2015.
[4] Saroj Kr. Biswas, “Intrusion Detection Using Machine Learning: A Comparison Study”, International Journal of Pure and Applied Mathematics, Volume 118 No. 19 2018, 101-114.
[5] R. Vinayakumar, Mamoun Alazab, (Senior Member, IEEE), K. P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, A.N. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System”, IEEE Access, VOLUME 7, 2019, Digital Object Identifier 10.1109/ACCESS.2019.2895334.
[6] Md. Zahangir Alom, Venkata Ramesh Bontupalli, and Tarek M. Taha, “Intrusion Detection using Deep Belief Networks”, 978-1-4673-7565-8/15/$31.00 ©2015 IEEE
[7] J. Kim, L. T. Thu and H. Kim “Long Short-Term Memory Recurrent Neural Network Classifier for Intrusion Detection,” IEEE International Conference on Platform Technology and Service, 2016.
[8] Anna L. Buczak and Erhan Guven,” A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”, IEEE Communications Surveys and Tutorials, Volume. 18, No. 2,2nd Quarter 2016.
[9] Ondrej Kubovič (ESET Security Awareness Specialist),” Machine-Learning Era in Cy-bersecurity: A Step Towards A Safer World or The Brink of Chaos”, Machine-Learning Era in Cybersecurity White Paper, February 2019
[10] N. Shone, V. D. Phai, T. N. Ngoc, Q. Shi, "A deep learning approach to network intrusion detection", IEEE Transactions on Emerging Topics in Computational Intelligence-Feb-2018(41-50).
[11] Dolly Uppal, Vinesh Jain, Rakhi Sinha and Vishakha Mehra and “Malware Detection and Classification Based on Extraction of API Sequences”, 978-1-4799-3080-7/14/$31.00_c 2014 IEEE.
[12] Mozammel Chowdhury, Azizur Rahman, Rafiqul Islam, “Protecting Data from Mal-ware Threats using Machine Learning Technique”, 2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA).
[13] Bowen Sun, Qi Li, Yanhui Guo, Qiaokun Wen, Xiaoxi Lin, Wenhan Liu, “Malware Family Classification Method Based on Static Feature Extraction”, 2017 3rd IEEE International Conference on Computer and Communications
[14] Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal, “Malware Classification with Deep Convolutional Neural Net-works”, 978-1-5386-3662-6/18/$31.00 ©2018 IEEE
[15] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, “DroidMat: Android mal-ware detection through manifest and API calls tracing,” in Proc. 7th Asia Joint Conf. Inf. Security (Asia JCIS), 2012, pp. 62–69.
[16] D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, “Drebin: Efficient and explainable detection of Android malware in your pocket,” in Proc. 20th Annu. Netw. Distrib. Syst. Security Symp. (NDSS), San Diego, CA, USA, Feb. 2014, pp. 1–15.
[17] M. V. Varsha, P. Vinod, and K. A. Dhanya, “Identification of malicious Android app using manifest and opcode features,” J. Comput. Virol. Hacking Tech., vol. 13, no. 2, pp. 125–138, 2017.

[18] A. Sharma and S. K. Dash, “Mining API calls and permissions for Android malware detection,” in Cryptology and Network Security. Cham, Switzerland: Springer Int., 2014, pp. 191–205.
[19] M. Zhao, F. Ge, T. Zhang, and Z. Yuan.,” An efficient SVM-based malware detection framework for Android,” in Communications in Computer and Information Science, vol. 243, Springer, 2011, pp. 158–166.
[20] W.-C. Wu, S.-H. Hung, “A dynamic Android malware detection framework using big data and machine learning,” in Proc. ACM Conf. Res. Adapt. Convergent Syst. (RACS), Towson, MD, USA, 2014, pp. 247–252.
[21] Suleiman Y. Yerima, Member, IEEE, and Sakir Sezer, Member, IEEE, “Droid Fusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection”, IEEE TRANSACTIONS ON CYBERNETICS, VOL. 49, NO. 2, FEBRUARY 2019.
[22] Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali, “Targeting spam control on middleboxes: Spam detection based on layer-3 e-mail content classification” Elsevier Computer Networks, 2009.
[23] James Clark, Irena Koprinska, Josiah Poon, “A Neural Network Based Approach to Automated E-mail Classification”, Proceedings IEEE/WIC International Conference on Web Intelligence, 0-7695-1932-6, Oct. 2003.
[24] S. Jancy Sickory Daisy, A.Rijuvana Begum, “Hybrid Spam Filtration Method using Ma-chine Learning Techniques”, International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-3075, Volume-8, Issue-9, July 2019.
[25] Sreekanth Madisetty and Maunendra Sankar Desarkar, “A Neural Network-Based Ensemble Approach for Spam Detection in Twitter”, IEEE Transactions on Computational Social Systems, Volume: 5, Issue: 4, Dec. 2018.
[26] Mehul Gupta, Aditya Bakliwal, Shubhangi Agarwal & Pulkit Mehndiratta, “A Comparative Study of Spam SMS Detection using Machine Learning Classifiers”, Eleventh International Conference on Contemporary Computing (IC3), 2-4 August, 2018, Noida, India, 978-1-5386-6835-1/18,2018 IEEE