Skip to main content

Machine Learning Techniques for Cyber Attacks Detection

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 233))

Summary

The increased usage of cloud services, growing number of users, changes in network infrastructure that connect devices running mobile operating systems, and constantly evolving network technology cause novel challenges for cyber security that have never been foreseen before. As a result, to counter arising threats, network security mechanisms, sensors and protection schemes have also to evolve in order to address the needs and problems of nowadays users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. of ACM Symposium on Applied Computing, pp. 201–208 (2002)

    Google Scholar 

  2. Choraś, M., Kozik, R., Puchalski, D., Hołubowicz, W.: Correlation Approach for SQL Injection Attacks Detection. In: Herrero, Á., et al. (eds.) Int. Joint Conf. CISIS’12-ICEUTE’12-SOCO’12. AISC, vol. 189, pp. 177–185. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. NSG, http://www.ijcst.com/vol31/4/sridevi.pdf

  4. LESG, http://www.cs.northwestern.edu/~ychen/Papers/LESG-ICNP07.pdf

  5. Shabtai, A., Menahem, E., Elovici, Y.: F-Sign: Automatic, Function-Based Signature Generation for Malware. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 41(4), 494–508 (2011)

    Article  Google Scholar 

  6. Kong, D., Jhi, Y.-C., Gong, T., Zhu, S., Liu, P., Xi, H.: SAS: Semantics aware signature generation for polymorphic worm detection. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 1–19. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. SNORT. Project homepage, http://www.snort.org/

  8. Sharma, M., Toshniwal, D.: Pre-clustering algorithm for anomaly detection and clustering that uses variable size buckets. In: 2012 1st International Conference on RecentAdvances in Information Technology (RAIT), pp. 515–519 (2012)

    Google Scholar 

  9. Adaniya, M.H.A.C., Lima, M.F., Rodrigues, J.J.P.C., Abrao, T., Proenca, M.L.: Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm. In: 2012 IEEE International Conference on Communications (ICC), pp. 1183–1187 (2012)

    Google Scholar 

  10. Mazel, J., Casas, P., Labit, Y., Owezarski, P.: Sub-Space clustering, Inter-Clustering Results Association and anomaly correlation for unsupervised network anomaly detection. In: 2011 7th International Conference on Network and Service Management (CNSM), pp. 1–8 (2011)

    Google Scholar 

  11. Yang, C., Deng, F., Yang, H.: An Unsupervised Anomaly Detection Approach using Subtractive Clustering and Hidden Markov Model. In: Second International Conference on Communications and Networking in China, CHINACOM 2007, pp. 313–316 (2007)

    Google Scholar 

  12. Liang, H., Wei-wu, R., Fei, R.: An Adaptive Anomaly Detection Based on Hierarchical Clustering. In: 2009 1st International Conference on Information Science and Engineering (ICISE), pp. 1626–1629 (2009)

    Google Scholar 

  13. Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks. Journal of Graph Algorithms and Applications 10(2), 191–218 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Liao, Q., Blaich, A., Van Bruggen, D., Striegel, A.: Managing networks through context: Graph visualization and exploration. Computer Networks 54, 2809–2824 (2010)

    Article  Google Scholar 

  15. Ricciato, F., Fleischer, W.: Bottleneck Detection via Aggregate Rate Analysis: A Real Casein a 3G Network. In: Proc. IEEE/IFIP NOMS (2004)

    Google Scholar 

  16. Thottan, M., Ji, C.: Anomaly Detectionin IP Networks. IEEE Trans. Signal Processing, Special Issue of Signal Processing in Networking 51(8), 2191–2204 (2003)

    Article  Google Scholar 

  17. Rish, I., Brodie, M., Sheng, M., Odintsova, N., Beygelzimer, A., Grabarnik, G., Hernandez, K.: Adaptive Diagnosis in Distributed Systems. IEEE Tran. Neural Networks 16(5), 1088–1109 (2005)

    Article  Google Scholar 

  18. Gaddam, S.R., Phoha, V.V., Balagani, K.S.: K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 DecisionTree Learning Methods. IEEE Transactions on Knowledge and Data Engineering 19(3), 345–354 (2007)

    Article  Google Scholar 

  19. Ma, R., Liu, Y., Lin, X., Wang, Z.: Network Anomaly Detection Using RBF Neural Network with Hybrid QPSO. In: IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, pp. 1284–1287 (2008)

    Google Scholar 

  20. Ma, J., Dai, G., Xu, Z.: Network Anomaly Detection Using Dissimilarity-Based One-Class SVM Classifier. In: International Conference on Parallel Processing Workshops, ICPPW 2009, pp. 409–414 (2009)

    Google Scholar 

  21. Soule, A., Salamatian, K., Taft, N.: CombiningFiltering and Statistical Methods for AnomalyDetection. In: Proc. of IMC Workshop (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kozik, R., Choraś, M. (2014). Machine Learning Techniques for Cyber Attacks Detection. In: S. Choras, R. (eds) Image Processing and Communications Challenges 5. Advances in Intelligent Systems and Computing, vol 233. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01622-1_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01622-1_44

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-01621-4

  • Online ISBN: 978-3-319-01622-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics