Intrusion detection using machine learning-hardened domain generation algorithms

Mustafa Abdulmajeed Shihab

Abstract


Machine learning has recently been applied in a variety of areas in information technology due to its superiority over the typical computer algorithms. The machine learning approaches are being integrated into cybersecurity detection approaches with the primary aim of supporting or providing an alternative to the first line of defense in networks. Although the automation of these detection and analysis systems is potent in today’s changing technological environment, the usefulness of machine learning in cybersecurity requires evaluation. In this research, we present an analysis and address cybersecurity concerns of machine learning techniques used in the detection of intrusion, spam, and malware. The analysis will entail the evaluation of the current maturity of the machine learning solutions when identifying their primary limitations, which has prevented the immediate adoption of machine learning in cybersecurity.

Full Text:

PDF

References


References

G. Apruzzese, M. Colajanni, L. Ferretti, A. Guido and M. Marchetti, "On the effectiveness of machine and deep learning for cyber security," in 2018 10th International Conference on Cyber Conflict, Tallinn, Estonia, 2018.

V. Ford and A. Siraj, "Applications of Machine Learning in Cyber Security," in 27th International Conference on Computer Applications in Industry and Engineering, New Orleans, Louisiana, 2014.

R. Devakunchari, Sourabh and P. Malik, "A Study of Cyber Security using Machine Learning Techniques," International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 7C2, pp. 183-186, 2019.

D. S. Berman, A. L. Buczak, J. S. Chavis and C. L. Corbett, "A Survey of Deep Learning Methods for Cyber Security," Information, vol. 2019, no. 10, pp. 122-157, 2013.

E. Proko, A. Hyso and D. Gjylapi, "Machine Learning Algorithms in Cyber Security," in 2018: The International Conference 'Recent Trends and Applications in Computer Science and Information Technology, Tirana, Albania, 2018.

A. L. Buczak and E. Guven, "A survey of data mining and machine learning methods for cyber security intrusion detection," IEEE Communications surveys & tutorials, vol. 18, no. 2, pp. 1153-1176, 2015.

O. Yavanoglu and M. Aydos, "A review on cyber security datasets for machine learning algorithms," in 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 2017.

A. D. Joseph, P. Laskov, F. Roli, D. J. Tygar and B. Nelson, "Machine Learning Methods for Computer Security," Dagstuhl Manifestos, vol. 3, no. 1, pp. 1-30, 2012.

E. Sheyabni and G. Javidi, "Seminars in Proactive Artificial Intelligence for Cybersecurity (SPAIC): Consulting and Research," Systemics, Cybernetics and Informatics, vol. 17, no. 1, pp. 297-305, 2019.

I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2818–2825, 2019, doi: 10.12928/TELKOMNIKA.v17i6.13201.

Y. Singh, P. K. Bhatia and O. Sangwan, "A Review of Studies on Machien Learning Techniques," International Journal of Computer Science and Security, vol. 1, no. 1, pp. 70-84, 2007.

M. Sabhnani and G. Serpen, "Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context," in Proceedings of the International Conference on Machine Learning; Models, Technologies and Applications, Las Vegas, Nevada, USA, 2003.

Meenu and S. Godara, "Phishing Detection using Machine Learning Techniques," International Journal of Engineering and Advanced Technology, vol. 9, no. 2, pp. 3820-3829, 2019.

S. Rawal, B. Rawal, A. Shaheen and S. Malik, "Phishing Detection in E-mails using Machine Learning," International Journal of Applied Information Systems, vol. 12, no. 7, pp. 12-24, 2017.

M. Islam and N. Chowdhury, "Phishing websites detection using machine learning based classification techniques," in International Conference on Advanced Information and Communication Technology, Chittagong, Bangladesh, 2016.

S. J. S. Daisy and R. A. Begum, "Hybrid Spam Filtration Method using Machine," International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, pp. 1818-1821, 2019.

D. Mallampati and N. P. Hegde, "A Machine Learning Based Email Spam Classification Framework Model: Related Challenges and Issues," International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 4, pp. 3137-3144, 2020.

D. Gavriluţ, M. Cimpoesu, D. Anton and L. Ciortuz, "Malware detection using machine learning," in Proceedings of the international Multiconference on Computer Science and Information Technology, Mrągowo, Poland, 2009.

S. A. Shawkat, K. S. L. Al-Badri, and I. Al Barazanchi, “Three band absorber design and optimization by neural network algorithm,” J. Phys. Conf. Ser., vol. 1530, no. 1, 2020, doi: 10.1088/1742-6596/1530/1/012129.

M. D. Khan, M. T. Shaikh, R. Ansari, M. Suriya and S. Suryawanshi, "Malware detection using Machine Learning Algorithms," International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no. 9, pp. 195-199, 2017.




DOI: http://dx.doi.org/10.21533/pen.v8i4.1757

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Mustafa Abdmajeed Shihab

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License