SlideShare a Scribd company logo
1 of 30
Presented By : Nishant D. Mehta
Class : TE-A
Roll No. : TA1326
Subject : Seminar & Technical Communication
Laboratory
Guidance : Prof. Ashwini Taksal
To Use The Concept of
Data Mining and
Machine Learning
Methods
for Cyber Security &
Intrusion DetectionMonday, December 5, 2016 1
J.S.P.M.’s Imperial College of Engineering & Research
Department of Computer Engineering
Monday, December 5, 2016 2
Agenda
 Abstract
 Introduction
 Objectives
 Literature Review
 Overview And Study
 Conclusion
 Future Scope
 References
Abstract
Monday, December 5, 2016 3
The main focus of this project is on survey of
machine learning (ML) and data mining (DM)
methods for cyber analytics in support of intrusion
detection.
The data are so important in ML/DM approaches,
some well-known cyber data sets used in ML/DM are
described.
Discussion of challenges for using ML/DM for cyber
security is presented, and some recommendations on
when to use a given methods are provided.
Monday, December 5, 2016 4
Introduction
 Due to the proliferation of high-speed Internet access,
more and more organizations are becoming
vulnerable to potential cyber attacks, such as network
intrusions.
 The ML/DM methods are described, as well as
several applications of each method to cyber intrusion
detection problems also stated.
Objective
Monday, December 5, 2016 5
The main focus is on cyber intrusion detection as it applies to
wired networks. With a wired network, an adversary must
pass through several layers of defense at firewalls and
operating systems, or gain physical access to the network.
However, a wireless network can be targeted at any node, so it
is naturally more vulnerable to malicious attacks than a wired
network. The ML and DM methods covered in this seminar
are fully applicable to the intrusion and misuse detection
problems in both wired and wireless networks.
Literature Survey
Monday, December 5, 2016 6
Sr.
No.
Name of the author Year of
Project
Research Paper
Name
Disadvantages
1. T. T. T. Nguyen, G.
Armitage
2008 “A survey of
techniques for
internet traffic
classification
using machine
learning “
Focused only
on IP Flows and
Cyber Data.
Methods Are
not introduced
for intrusion
detection.
2. P. Garcia-Teodoro ,
J. Diaz-Verdejo ,
G. Maciá-
Fernández
and E. Vázquez
2009 “Anomaly-based
network
intrusion
detection:
Techniques,
systems and
challenges ”
Does not
present a full
set of state-of-
the-art machine
learning
methods.
Literature Survey
Monday, December 5, 2016 7
Sr.
No.
Name of the author Year of
Project
Research Paper
Name
Disadvantages
3. A. Sperotto
G. Schaffrath
R. Sadre,
C. Morariu Pras
and B. Stiller
2010 “An overview
of IP flow-
based intrusion
detection ”
There is no
explanation of
the technical
details of the
individual
methods
4. S. X. Wu and
W. Banzhaf
2010 “The use of
computational
intelligence in
intrusion
detection
systems:
A review”
Only
Computational
Intelligence
methods are
described, major
ML/DM methods
such as clustering
, decision trees ,
and rule mining
are not included
What is Cyber Crime ?
Monday, December 5, 2016 8
 Crime committed using a computer and the internet to
steal data or information.
 The computer used as an object or subject of crime..
 Malicious programs.
 Illegal imports.
 Computer Vandalism.
What is Cyber Security ?
Monday, December 5, 2016 9
 Set of technologies and processes designed computers,
networks and data from unauthorized access, change or
destruction.
 Composed of computer security system and network
security systems.
Continue…
Monday, December 5, 2016 10
 Cyber Security includes :
• Firewall.
• Antivirus Software.
• Intrusion Detection System (IDS).
Intrusion Detection System
Monday, December 5, 2016 11
Fig : Intrusion Detection System
Continue…
Monday, December 5, 2016 12
 There are three main types of cyber
analytics for supporting IDS :
1) Misuse Based.
2) Anomaly Based.
3) Hybrid.
Continue…
Monday, December 5, 2016 13
 Misuse Based Detection
• Designed to detect known attacks by using
signatures of those attacks.
• Effective detecting known type of attacks
without generating false alarms.
• Frequent manual updating of data is required.
• Cannot detect Novel (Zero-day) attacks.
Continue…
Monday, December 5, 2016 14
 Anomaly Based Detection
• Identifies the anomalies from normal behavior
• Able to detect Zero-Day Attack
• Profiles of normal activity are customized for
every system
 Hybrid Detection
• Combination of misuse and anomaly detection.
• Increases the detection rate and decreases the
false alarm generation.
What is Machine Learning And Data
Mining ?
Monday, December 5, 2016 15
 Machine Learning :
• Introduced in 1960’s
• It gives ability to computers to learn without being
explicitly programmed.
• Need of goal from domain
• There should be three phases :- 1. Training, 2.
Validation and 3. Testing.
 Data Mining :
• Introduced in 1980’s
• Focused on discovery of previously unknown and
important properties in data.
• Used for extracting patterns from data
CRISP- DM Model
Monday, December 5, 2016 16
Fig : CRISP-DM Model
Monday, December 5, 2016 17
Cyber Security Data Sets For DM
& ML
The Cyber Security data sets for DM and ML
are given below :
a) Packet Level Data
b) Netflow Data
c) Public Data Sets
Packet Level Data
Monday, December 5, 2016 18
 Protocols are used for transmission of packet through
network.
 The network packets are transmitted and received at
the physical interface.
 Packets are captured by API in computers called as
pcap.
 For Linux it is Libpcap and for windows it is
WinPCap.
 Ethernet port have payload called as IP payload.
NetFlow Data
Monday, December 5, 2016 19
 Introduced as a router feature by Cisco.
 Version 5 defines unidirectional flow of packets.
 The packet attributes are : ingress interface, source
IP address, destination IP address, IP protocol, source
port, destination port and type of services.
 Netflow includes compressed and preprocessed
packets.
Public Data Set
Monday, December 5, 2016 20
 The Defense Advance Research Projects Agency
(DARPA) in 1998 and 1999 data sets are mostly used.
 This Data Set has basic features captured by pcap.
 DARPA defines four types of attacks in 1998 :
DOS Attack, U2R Attack, R2LAttack, Probe or Scan.
Monday, December 5, 2016 21
Cyber Security Methods For DM
& ML
 Artificial Neural Networks (ANN)
 Association Rules & Fuzzy Association Rules
 Bayesian Network
 Clustering
 Decision Tree
 Ensemble Learning
 Evolutionary Computation
 Hidden Markov Model
 Inductive Learning
 Nalve Bayes
 Sequential Pattern Mining
 Support Vector Machine
Monday, December 5, 2016 22
Artificial Neural Network
 Network of Neurons
 Output of one node is input to other.
 ANN can be used as a multi-category classifier of
intrusion detection
 Data processing stage used to select 9 features:
protocol ID, source port, destination port, source
address, destination address, ICMP type, ICMP
code, raw data length and raw data.
Association Rule & Fuzzy
Association Rule
Monday, December 5, 2016 23
Monday, December 5, 2016 24
Fig : Bayesian Network
Bayesian Network
Hidden Markov Model
Monday, December 5, 2016 25
Fig : Hidden Markov Model
Conclusion
Monday, December 5, 2016 26
 This seminar describes the literature review of ML and
DM methods used for Cyber Security. Different ML
and DM techniques in the cyber domain can be used
for both Misuse Detection and Anomaly Detection.
 There are some peculiarities of the cyber problem that
make ML and DM methods more difficult to use.
 They are especially related to how often the model
needs to be retrained.
References
Monday, December 5, 2016 27
 A. Mukkamala, and A. Sung, and A. Abraham, “Cyber
security challenges: designing efficient intrusion
detection systems and antivirus tools,” Vemuri, V. Rao,
Enhancing Computer Security with Smart
Technology.(Auerbach, 2006) (2005), pp. 125–163
 T. T. T. Nguyen, and G. Armitage, “A survey of
techniques for internet traffic classification using
machine learning,” IEEE Communications Surveys &
Tutorials, no. 4, 2008, pp. 56–76
 P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-
Fernández, and E. Vázquez, “Anomaly-based network
intrusion detection: Techniques, systems and
challenges,” Computers & security 28, no. 1, 2009, pp.
18–28
References
Monday, December 5, 2016 28
 S. X. Wu, and W. Banzhaf, “The use of computational
intelligence in intrusion detection systems: A review,”
Applied Soft Computing 10, no. 1, 2010, pp. 1–35
 Y. Zhang, L. Wenke, and Yi-An Huang, “Intrusion
detection techniques for mobile wireless networks,”
Wireless Networks 9.5, 2003, pp. 545-556.
Questions ?
Monday, December 5, 2016 29
Thank You
!!!
Monday, December 5, 2016 30

More Related Content

What's hot

Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Metasploit seminar
Metasploit seminarMetasploit seminar
Metasploit seminarhenelpj
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )TechnoHacks_Infosystem
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Akash Karwande
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 

What's hot (20)

Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Metasploit seminar
Metasploit seminarMetasploit seminar
Metasploit seminar
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Information security
Information securityInformation security
Information security
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 

Viewers also liked

When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...
Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...
Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...Cheng Chen
 
CSI 5387: Concept Learning Systems / Machine Learning
CSI 5387: Concept Learning Systems / Machine Learning CSI 5387: Concept Learning Systems / Machine Learning
CSI 5387: Concept Learning Systems / Machine Learning butest
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-EraJK Tech
 
Kaggle Higgs Boson Machine Learning Challenge
Kaggle Higgs Boson Machine Learning ChallengeKaggle Higgs Boson Machine Learning Challenge
Kaggle Higgs Boson Machine Learning ChallengeBernard Ong
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
General camouflage
General camouflageGeneral camouflage
General camouflagesanjucuckoo
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen VidaB
 
Pay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud ProposalPay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud ProposalBrainfartsy
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)gj4u
 
NIGP Forensic Audit: Request For Copies Per Open Records Law
NIGP Forensic Audit: Request For Copies Per Open Records LawNIGP Forensic Audit: Request For Copies Per Open Records Law
NIGP Forensic Audit: Request For Copies Per Open Records LawJon Hansen
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analyticsSven Hezel
 
Machine Learning Introduction
Machine Learning IntroductionMachine Learning Introduction
Machine Learning IntroductionMark Chang
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big DataMax Lin
 
FORENSIC AUDIT
FORENSIC  AUDITFORENSIC  AUDIT
FORENSIC AUDITABC
 
A project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and AuditingA project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and AuditingDannyNaik
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systemsXavier Amatriain
 

Viewers also liked (20)

When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...
Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...
Big Data Competition: maximizing your potential
 exampled with the 2014 Higgs...
 
CSI 5387: Concept Learning Systems / Machine Learning
CSI 5387: Concept Learning Systems / Machine Learning CSI 5387: Concept Learning Systems / Machine Learning
CSI 5387: Concept Learning Systems / Machine Learning
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
Kaggle Higgs Boson Machine Learning Challenge
Kaggle Higgs Boson Machine Learning ChallengeKaggle Higgs Boson Machine Learning Challenge
Kaggle Higgs Boson Machine Learning Challenge
 
Forensic Analysis V1
Forensic Analysis V1Forensic Analysis V1
Forensic Analysis V1
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
General camouflage
General camouflageGeneral camouflage
General camouflage
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Pay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud ProposalPay Per Click Advertising - Click Fraud Proposal
Pay Per Click Advertising - Click Fraud Proposal
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)
 
NIGP Forensic Audit: Request For Copies Per Open Records Law
NIGP Forensic Audit: Request For Copies Per Open Records LawNIGP Forensic Audit: Request For Copies Per Open Records Law
NIGP Forensic Audit: Request For Copies Per Open Records Law
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
 
Machine Learning Introduction
Machine Learning IntroductionMachine Learning Introduction
Machine Learning Introduction
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big Data
 
FORENSIC AUDIT
FORENSIC  AUDITFORENSIC  AUDIT
FORENSIC AUDIT
 
A project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and AuditingA project report on Forensic Accounting and Auditing
A project report on Forensic Accounting and Auditing
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems
 

Similar to To use the concept of Data Mining and machine learning concept for Cyber security and Intrusion detection

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
Machine Learning Project
Machine Learning ProjectMachine Learning Project
Machine Learning Projectbutest
 
Network_System_Admin.docx
Network_System_Admin.docxNetwork_System_Admin.docx
Network_System_Admin.docxPhilip Martin
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Matthew Kurnava
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET-  	  A Survey for an Efficient Secure Guarantee in Network FlowIRJET-  	  A Survey for an Efficient Secure Guarantee in Network Flow
IRJET- A Survey for an Efficient Secure Guarantee in Network FlowIRJET Journal
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...IJCSIS Research Publications
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
Visualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithmVisualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithmIJCNCJournal
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 

Similar to To use the concept of Data Mining and machine learning concept for Cyber security and Intrusion detection (20)

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
Machine Learning Project
Machine Learning ProjectMachine Learning Project
Machine Learning Project
 
Network_System_Admin.docx
Network_System_Admin.docxNetwork_System_Admin.docx
Network_System_Admin.docx
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Survey_ttronco
Survey_ttroncoSurvey_ttronco
Survey_ttronco
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
IRJET-  	  A Survey for an Efficient Secure Guarantee in Network FlowIRJET-  	  A Survey for an Efficient Secure Guarantee in Network Flow
IRJET- A Survey for an Efficient Secure Guarantee in Network Flow
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
A44090104
A44090104A44090104
A44090104
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
savi technical ppt.pptx
savi technical ppt.pptxsavi technical ppt.pptx
savi technical ppt.pptx
 
Visualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithmVisualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithm
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

To use the concept of Data Mining and machine learning concept for Cyber security and Intrusion detection

  • 1. Presented By : Nishant D. Mehta Class : TE-A Roll No. : TA1326 Subject : Seminar & Technical Communication Laboratory Guidance : Prof. Ashwini Taksal To Use The Concept of Data Mining and Machine Learning Methods for Cyber Security & Intrusion DetectionMonday, December 5, 2016 1 J.S.P.M.’s Imperial College of Engineering & Research Department of Computer Engineering
  • 2. Monday, December 5, 2016 2 Agenda  Abstract  Introduction  Objectives  Literature Review  Overview And Study  Conclusion  Future Scope  References
  • 3. Abstract Monday, December 5, 2016 3 The main focus of this project is on survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. The data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. Discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given methods are provided.
  • 4. Monday, December 5, 2016 4 Introduction  Due to the proliferation of high-speed Internet access, more and more organizations are becoming vulnerable to potential cyber attacks, such as network intrusions.  The ML/DM methods are described, as well as several applications of each method to cyber intrusion detection problems also stated.
  • 5. Objective Monday, December 5, 2016 5 The main focus is on cyber intrusion detection as it applies to wired networks. With a wired network, an adversary must pass through several layers of defense at firewalls and operating systems, or gain physical access to the network. However, a wireless network can be targeted at any node, so it is naturally more vulnerable to malicious attacks than a wired network. The ML and DM methods covered in this seminar are fully applicable to the intrusion and misuse detection problems in both wired and wireless networks.
  • 6. Literature Survey Monday, December 5, 2016 6 Sr. No. Name of the author Year of Project Research Paper Name Disadvantages 1. T. T. T. Nguyen, G. Armitage 2008 “A survey of techniques for internet traffic classification using machine learning “ Focused only on IP Flows and Cyber Data. Methods Are not introduced for intrusion detection. 2. P. Garcia-Teodoro , J. Diaz-Verdejo , G. Maciá- Fernández and E. Vázquez 2009 “Anomaly-based network intrusion detection: Techniques, systems and challenges ” Does not present a full set of state-of- the-art machine learning methods.
  • 7. Literature Survey Monday, December 5, 2016 7 Sr. No. Name of the author Year of Project Research Paper Name Disadvantages 3. A. Sperotto G. Schaffrath R. Sadre, C. Morariu Pras and B. Stiller 2010 “An overview of IP flow- based intrusion detection ” There is no explanation of the technical details of the individual methods 4. S. X. Wu and W. Banzhaf 2010 “The use of computational intelligence in intrusion detection systems: A review” Only Computational Intelligence methods are described, major ML/DM methods such as clustering , decision trees , and rule mining are not included
  • 8. What is Cyber Crime ? Monday, December 5, 2016 8  Crime committed using a computer and the internet to steal data or information.  The computer used as an object or subject of crime..  Malicious programs.  Illegal imports.  Computer Vandalism.
  • 9. What is Cyber Security ? Monday, December 5, 2016 9  Set of technologies and processes designed computers, networks and data from unauthorized access, change or destruction.  Composed of computer security system and network security systems.
  • 10. Continue… Monday, December 5, 2016 10  Cyber Security includes : • Firewall. • Antivirus Software. • Intrusion Detection System (IDS).
  • 11. Intrusion Detection System Monday, December 5, 2016 11 Fig : Intrusion Detection System
  • 12. Continue… Monday, December 5, 2016 12  There are three main types of cyber analytics for supporting IDS : 1) Misuse Based. 2) Anomaly Based. 3) Hybrid.
  • 13. Continue… Monday, December 5, 2016 13  Misuse Based Detection • Designed to detect known attacks by using signatures of those attacks. • Effective detecting known type of attacks without generating false alarms. • Frequent manual updating of data is required. • Cannot detect Novel (Zero-day) attacks.
  • 14. Continue… Monday, December 5, 2016 14  Anomaly Based Detection • Identifies the anomalies from normal behavior • Able to detect Zero-Day Attack • Profiles of normal activity are customized for every system  Hybrid Detection • Combination of misuse and anomaly detection. • Increases the detection rate and decreases the false alarm generation.
  • 15. What is Machine Learning And Data Mining ? Monday, December 5, 2016 15  Machine Learning : • Introduced in 1960’s • It gives ability to computers to learn without being explicitly programmed. • Need of goal from domain • There should be three phases :- 1. Training, 2. Validation and 3. Testing.  Data Mining : • Introduced in 1980’s • Focused on discovery of previously unknown and important properties in data. • Used for extracting patterns from data
  • 16. CRISP- DM Model Monday, December 5, 2016 16 Fig : CRISP-DM Model
  • 17. Monday, December 5, 2016 17 Cyber Security Data Sets For DM & ML The Cyber Security data sets for DM and ML are given below : a) Packet Level Data b) Netflow Data c) Public Data Sets
  • 18. Packet Level Data Monday, December 5, 2016 18  Protocols are used for transmission of packet through network.  The network packets are transmitted and received at the physical interface.  Packets are captured by API in computers called as pcap.  For Linux it is Libpcap and for windows it is WinPCap.  Ethernet port have payload called as IP payload.
  • 19. NetFlow Data Monday, December 5, 2016 19  Introduced as a router feature by Cisco.  Version 5 defines unidirectional flow of packets.  The packet attributes are : ingress interface, source IP address, destination IP address, IP protocol, source port, destination port and type of services.  Netflow includes compressed and preprocessed packets.
  • 20. Public Data Set Monday, December 5, 2016 20  The Defense Advance Research Projects Agency (DARPA) in 1998 and 1999 data sets are mostly used.  This Data Set has basic features captured by pcap.  DARPA defines four types of attacks in 1998 : DOS Attack, U2R Attack, R2LAttack, Probe or Scan.
  • 21. Monday, December 5, 2016 21 Cyber Security Methods For DM & ML  Artificial Neural Networks (ANN)  Association Rules & Fuzzy Association Rules  Bayesian Network  Clustering  Decision Tree  Ensemble Learning  Evolutionary Computation  Hidden Markov Model  Inductive Learning  Nalve Bayes  Sequential Pattern Mining  Support Vector Machine
  • 22. Monday, December 5, 2016 22 Artificial Neural Network  Network of Neurons  Output of one node is input to other.  ANN can be used as a multi-category classifier of intrusion detection  Data processing stage used to select 9 features: protocol ID, source port, destination port, source address, destination address, ICMP type, ICMP code, raw data length and raw data.
  • 23. Association Rule & Fuzzy Association Rule Monday, December 5, 2016 23
  • 24. Monday, December 5, 2016 24 Fig : Bayesian Network Bayesian Network
  • 25. Hidden Markov Model Monday, December 5, 2016 25 Fig : Hidden Markov Model
  • 26. Conclusion Monday, December 5, 2016 26  This seminar describes the literature review of ML and DM methods used for Cyber Security. Different ML and DM techniques in the cyber domain can be used for both Misuse Detection and Anomaly Detection.  There are some peculiarities of the cyber problem that make ML and DM methods more difficult to use.  They are especially related to how often the model needs to be retrained.
  • 27. References Monday, December 5, 2016 27  A. Mukkamala, and A. Sung, and A. Abraham, “Cyber security challenges: designing efficient intrusion detection systems and antivirus tools,” Vemuri, V. Rao, Enhancing Computer Security with Smart Technology.(Auerbach, 2006) (2005), pp. 125–163  T. T. T. Nguyen, and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Communications Surveys & Tutorials, no. 4, 2008, pp. 56–76  P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá- Fernández, and E. Vázquez, “Anomaly-based network intrusion detection: Techniques, systems and challenges,” Computers & security 28, no. 1, 2009, pp. 18–28
  • 28. References Monday, December 5, 2016 28  S. X. Wu, and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review,” Applied Soft Computing 10, no. 1, 2010, pp. 1–35  Y. Zhang, L. Wenke, and Yi-An Huang, “Intrusion detection techniques for mobile wireless networks,” Wireless Networks 9.5, 2003, pp. 545-556.