Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security
Muralidhara S1
Section:Survey Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 1412-1417, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14121417
Online published on Jun 30, 2018
Copyright © Muralidhara S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Muralidhara S, “Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1412-1417, 2018.
MLA Style Citation: Muralidhara S "Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security." International Journal of Computer Sciences and Engineering 6.6 (2018): 1412-1417.
APA Style Citation: Muralidhara S, (2018). Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security. International Journal of Computer Sciences and Engineering, 6(6), 1412-1417.
BibTex Style Citation:
@article{S_2018,
author = { Muralidhara S},
title = {Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1412-1417},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2361},
doi = {https://doi.org/10.26438/ijcse/v6i6.14121417}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.14121417}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2361
TI - Study of Information Mining (DM) and Machine Learning (ML) Strategies on Digital Security
T2 - International Journal of Computer Sciences and Engineering
AU - Muralidhara S
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1412-1417
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
557 | 277 downloads | 221 downloads |
Abstract
This paper is a survey on how the Machine Learning & Information Mining techniques have been employed to automate the cyber detection system and discusses necessary background knowledge on Digital Security. After identifying various issues on digital intrusion detection and security, also various Machine Language and Information Mining approaches that have been employed to resolve this. This paper reveals insight into complexities, quirks and capability of utilizing Machine Learning algorithms for Digital Security. The machine learning and information mining algorithms and procedures discussed below are applied in digital security intrusion detection systems in real time scenarios.
Key-Words / Index Term
Intrusion Detection System,Anomaly Detection, Misuse Detection, Data Mining, Machine Learning
References
[1]. A. Mukkamala, A. Sung, and A. Abraham, “Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools,” in Enhancing Computer Security with Smart Technology, V.R. Vemuri, Ed. New York, NY, USA: Auerbach, 2005, pp. 125–163.
[2]. K.Hornik, M.Stinchcombe, and H.White, “Multilayer feed forward networks are universal approximators,” Neural Netw., vol. 2, pp. 359–366, 1989.
[3]. F. Rosenblatt, “The perceptron: A probabilistic model for information storage and organization in the brain,” Psychol. Rev., vol. 65, no. 6, pp. 386–408, 1958.
[4]. Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, “An efficient intrusion detection system based on support vector machines and gradually feature removal method,” Expert Syst. Appl., vol. 39, no. 1, pp. 424–430, 2012.
[5]. F. Amiri, M. Mahdi, R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, “Mutual information-based feature selection for IDSs,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1184–1199, 2011.
[6]. C. Wagner, F. Jérôme, and E. Thomas, “Machine learning approach for IP-flow record anomaly detection,” in Networking 2011.New York, NY, USA: Springer, 2011, pp. 28–39.
[7]. D. Brauckhoff, A. Wagner, and M. May, “Flame: A low-level anomaly modeling engine,” in Proc. Conf. Cyber Secur. Exp. Test, 2008