Open Access   Article Go Back

Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security

Muralidhara S1

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1412-1417, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.14121417

Online published on Jun 30, 2018

Copyright © Muralidhara S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Muralidhara S, “Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1412-1417, 2018.

MLA Style Citation: Muralidhara S "Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security." International Journal of Computer Sciences and Engineering 6.6 (2018): 1412-1417.

APA Style Citation: Muralidhara S, (2018). Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security. International Journal of Computer Sciences and Engineering, 6(6), 1412-1417.

BibTex Style Citation:
@article{S_2018,
author = { Muralidhara S},
title = {Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1412-1417},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2361},
doi = {https://doi.org/10.26438/ijcse/v6i6.14121417}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.14121417}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2361
TI - Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security
T2 - International Journal of Computer Sciences and Engineering
AU - Muralidhara S
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1412-1417
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
557 277 downloads 221 downloads
  
  
           

Abstract

This paper is a survey on how the Machine Learning & Information Mining techniques have been employed to automate the cyber detection system and discusses necessary background knowledge on Digital Security. After identifying various issues on digital intrusion detection and security, also various Machine Language and Information Mining approaches that have been employed to resolve this. This paper reveals insight into complexities, quirks and capability of utilizing Machine Learning algorithms for Digital Security. The machine learning and information mining algorithms and procedures discussed below are applied in digital security intrusion detection systems in real time scenarios.

Key-Words / Index Term

Intrusion Detection System,Anomaly Detection, Misuse Detection, Data Mining, Machine Learning

References

[1]. A. Mukkamala, A. Sung, and A. Abraham, “Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools,” in Enhancing Computer Security with Smart Technology, V.R. Vemuri, Ed. New York, NY, USA: Auerbach, 2005, pp. 125–163.
[2]. K.Hornik, M.Stinchcombe, and H.White, “Multilayer feed forward networks are universal approximators,” Neural Netw., vol. 2, pp. 359–366, 1989.
[3]. F. Rosenblatt, “The perceptron: A probabilistic model for information storage and organization in the brain,” Psychol. Rev., vol. 65, no. 6, pp. 386–408, 1958.
[4]. Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, “An efficient intrusion detection system based on support vector machines and gradually feature removal method,” Expert Syst. Appl., vol. 39, no. 1, pp. 424–430, 2012.
[5]. F. Amiri, M. Mahdi, R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, “Mutual information-based feature selection for IDSs,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1184–1199, 2011.
[6]. C. Wagner, F. Jérôme, and E. Thomas, “Machine learning approach for IP-flow record anomaly detection,” in Networking 2011.New York, NY, USA: Springer, 2011, pp. 28–39.
[7]. D. Brauckhoff, A. Wagner, and M. May, “Flame: A low-level anomaly modeling engine,” in Proc. Conf. Cyber Secur. Exp. Test, 2008