Open Access   Article Go Back

Machine learning in the prediction, determination and further study of different cyber-attacks

Sagar Bansal1 , Anshika Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 27-36, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.2736

Online published on Oct 31, 2019

Copyright © Sagar Bansal, Anshika Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sagar Bansal, Anshika Singh, “Machine learning in the prediction, determination and further study of different cyber-attacks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.27-36, 2019.

MLA Style Citation: Sagar Bansal, Anshika Singh "Machine learning in the prediction, determination and further study of different cyber-attacks." International Journal of Computer Sciences and Engineering 7.10 (2019): 27-36.

APA Style Citation: Sagar Bansal, Anshika Singh, (2019). Machine learning in the prediction, determination and further study of different cyber-attacks. International Journal of Computer Sciences and Engineering, 7(10), 27-36.

BibTex Style Citation:
@article{Bansal_2019,
author = {Sagar Bansal, Anshika Singh},
title = {Machine learning in the prediction, determination and further study of different cyber-attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {27-36},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4889},
doi = {https://doi.org/10.26438/ijcse/v7i10.2736}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.2736}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4889
TI - Machine learning in the prediction, determination and further study of different cyber-attacks
T2 - International Journal of Computer Sciences and Engineering
AU - Sagar Bansal, Anshika Singh
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 27-36
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
549 682 downloads 247 downloads
  
  
           

Abstract

Cyber Security introduces a group of methods, used to shield networks, data and programs from intrusion, deterioration and illegal access. Cyber intrusion is the act of breaking the security of one’s computer with the means of a network. To cut down the threat of various illegal accessing in order to enhance the cyber security, Machine Learning approach is used widely. Machine learning in itself is the study of various ways to train the machine with real datasets and make them act like humans in similar circumstances. In this paper, most of the Machine Learning and Deep Learning algorithms that are used for enhancing cyber security have been summed up.

Key-Words / Index Term

Machine Learning, Deep Learning, Cyber security, Intrusion

References

[1] M. Esmalifalak, Nam Tuan Nguyen, Rong Zheng, Han. Zhu, “Detecting stealthy false data injection using machine learning in smart grid”, 2013 IEEE Global Communications Conference (GLOBECOM), pp.1-9, 2013.
[2] M. Chora, R. Kozik, “Machine learning techniques applied to detect cyber attacks on web applications”, Logic Journal of IGPL, Vol. 23, Issue.1, pp. 45–56, 2015.
[3] C. Amrutkar, Y. S. Kim, P. Traynor. “Detecting Mobile Malicious Webpages in Real Time”, IEEE Transactions on Mobile Computing, Vol. 16, Issue.8, 2017.
[4] J. Siryani, B. Tanju, T. J. Eveleigh. “A Machine Learning Decision-Support System Improves the Internet of Things’ Smart Meter Operations. IEEE Internet of Things Journal, Vol. 4, Issue.4, 2017.
[5] Nir Nissim, Aviad Cohen, and Yuval Elovici, “ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology”. IEEE Transactions on Information Forensics and Security, Vol. 12, Issue.3, 2017.
[6] K. Fukuda, J. Heidemann, A. Qadeer, “Detecting Malicious Activity With DNS Backscatter Over Time”, IEEE/ACM Transactions on Networking, Vol. 25, Issue.5, 2017.
[7] S. Deng, A. H. Zhou, D. Yue, B. Hu, L. P. Zhu, “Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system”, IET Control Theory & Applications, Vol. 11, Issue.11, 2017.
[8] G. Loukas, T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, D. Gan, “Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning”,IEEE Access, Vol. 6, 2018.
[9] C. C. San, M. M. S. Thwin, N. L. Htun, “Malicious Software Family Classification using Machine Learning Multi-class Classifiers”, Computational Science and Technology, pp. 423–433, 2018.
[10] J. B., Fraley, J. Cannady, “The promise of machine learning in cybersecurity”, SoutheastCon 2017, 2017.
[11] F. Bu, “A High-Order Clustering Algorithm Based on Dropout Deep Learning for Heterogeneous Data in Cyber-Physical-Social Systems”, IEEE Access, Vol. 6, 2018.
[12] S. Ahmed, Y. Lee, S. H. Hyun, I. Koo, “Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning”. IEEE Access, Vol. 6, 2018.
[13] S. Naseer, Y. Saleem, S. Khalid, M. K. Bashir, J. Han, M. M. Iqbal, K. Han, “Enhanced Network Anomaly Detection Based on Deep Neural Networks”, IEEE Access, Vol. 14, Issue.8, pp. 1–15, 2018.
[14] N. R. Sabar, X. Yi, A. Song, “A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security”,. IEEE Access, Vol. 6, 2018.
[15] T. Alves, R. Das, T. Morris, “Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers” IEEE Embedded Systems Letters, Vol. 1, 2018.
[16] L. Fernandez Maimo, A. L. Perales Gomez, F. J. Garcia Clemente, M. Gil Perez, G. Martinez Perez, “A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks”, IEEE Access, Vol. 6, 2018.
[17] M. Yousefi-Azar, L. Hamey, V. Varadharajan, S. Chen, “Malytics: A Malware Detection Scheme”, IEEE Access, Vol. 4, pp. 1–14, 2018.
[18] P. Chattopadhyay, L. Wang, Y. P. Tan, “Scenario-Based Insider Threat Detection From Cyber Activities”, IEEE Transactions on Computational Social Systems, pp. 1–16, 2018.
[19] M. N. Napiah, M. Y. I. Bin Idris, R. Ramli, I. Ahmedy, “Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protoco”. IEEE Access, Vol. 6, 2018.
[20] J. Li, Y. Ye, Y. Zhou, J. Ma, “CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages”, IEEE Access, Vol. 6, 2018.
[21] A. Abeshu, N. Chilamkurti, “Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing”, IEEE Communications Magazine, Vol. 56, Issue.2, pp. 169–175, 2018.
[22] J. Liu, C. Zhang, Y. Fang, “EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis”, IEEE Internet of Things Journal, Vol. 5, Issue.2, 2018.
[23] M. D. Smith, M. E.Pate-Cornell, “Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multiarmed Bandit Approach to Cyber Security Investment”, IEEE Transactions on Engineering Management, Vol. 65, Issue.3, 2018.
[24] D. Mallampati, “An Efficient Spam Filtering using Supervised Machine Learning Techniques”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue.2, pp.33-37, 2018.
[25] B. Wahyudi, K. Ramli, H. Murfi, “Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System”, International Journal of Communication Networks and Information Security, Vol. 10, No. 2, 2018.