Review Paper on Shallow Learning and Deep Learning Methods for Network security
Keywords:
Machine learning, Deep learning, Cyber security, Adversarial learningAbstract
Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks with the objective of supporting or notwithstanding supplanting the principal level of security experts although the total mechanization of identification and examination is a luring objective, the adequacy of machine learning in digital security must be assessed with the due steadiness. With the improvement of the Internet, digital assaults are changing quickly and the digital security circumstance isn`t hopeful. Since information are so critical in ML/DL strategies, we portray a portion of the normally utilized system datasets utilized in ML/DL, examine the difficulties of utilizing ML/DL for digital security and give recommendations to look into bearings. Malware has developed over the previous decades including novel engendering vectors, strong versatility methods and also different and progressively propelled assault procedures. The most recent manifestation of malware is the infamous bot malware that furnish the aggressor with the capacity to remotely control traded off machines therefore making them a piece of systems of bargained machines otherwise called botnets. Bot malware depend on the Internet for proliferation, speaking with the remote assailant and executing assorted noxious exercises. As system movement action is one of the principle characteristics of malware and botnet task, activity investigation is frequently observed as one of the key methods for recognizing traded off machines inside the system. We present an examination, routed to security experts, of machine learning methods connected to the recognition of interruption, malware, and spam.
References
S. Aftergood, ``Cybersecurity: The cold war online,`` Nature, vol. 547,no. 7661, pp. 30_31, Jul. 2017.
M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and prospects,” Science, 2015.
A. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, 2015.
E. Blanzieri and A. Bryl, “A survey of learning-based techniques of email spam filtering,” Artificial Intelligence Review, 2008.
J. Gardiner and S. Nagaraja, “On the Security of Machine Learning in Malware C8C Detection,” ACM Computing Surveys, 2016.
R. G. Smith and J. Eckroth, ``Building AI applications: Yesterday, today, and tomorrow,`` AI Mag., vol. 31, no. 1, pp. 6_22, 2017.
P. Louridas and C. Ebert, ``Machine learning,`` IEEE Softw., vol. 33, no. 5,pp. 110115, Sep./Oct. 2016.
M. I. Jordan and T. M. Mitchell, ``Machine learning: Trends, perspectives, and prospects,`` Science, vol. 349, no. 6245, pp. 255260, 2015.
Y. LeCun, Y. Bengio, and G. Hinton, ``Deep learning,`` Nature, vol. 521,pp. 429444, May 2015.
M. Roesch. Snort-lightweight intrusion detection for networks. In Proceedingsof the 13th USENIX Conference on System Administration, pages229-231. Seattle, Washington, 1999.
M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. Thenids cluster: Scalable, stateful network intrusion detection on commodityhardware. Lecture Notes in Computer Science, 4630:107-126, 2007.
S. Zanero and S. Savaresi. Unsupervised learning techniques for an intrusion detection system. In SAC `04: Proceedings of the 2004 ACM symposium on Applied computing, pages 412-419, New York, NY, USA, 2004. ACM. ISBN 1-58113-812-1. doi: http://doi:acm:org/10:1145/967900:967988.
S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC), 3(3),2000.
R. Bace and P. Mell. Intrusion detection systems. Technical Report 800-31, National Institute of Standards and Technology (NIST), Special Publication,2001.
S.B. Kotsiantis, D. Kanellopoulos, and P.E. Pintelas. Data preprocessing for supervised learning. International Journal of Computer Science, 1(2): 111-117, 2006.
W. Lee and S.J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227-261, 2000.
6 Easy Steps to Learn Naive Bayes Algorithm (with codes in Python and R)SUNIL RAY, SEPTEMBER 11, 2017 https://www.analyticsvidhya.com/blog/2017/09/naive-bayes-explained/
Introduction to k-Nearest Neighbors: Simplified (with implementation in Python)TAVISH SRIVASTAVA, MARCH 26, 2018 https://www.analyticsvidhya.com/blog/2018/03/introduction-k-neighbours-algorithm-clustering/
Going Deeper in Spiking Neural Networks: VGG and Residual Architectures AbhronilSenguptaa,∗ , YutingYeb , Robert Wangb , ChiaoLiub , Kaushik Roya aPurdue University, West Lafayette, IN, USA bFacebook Reality Labs, Redmond, WA, USA
An Introduction to Clustering and different methods of clustering SAURAV KAUSHIK, NOVEMBER 3, 2016
A Tutorial on Clustering Algorithms https://home.deib.polimi.it/matteucc/Clustering/tutorial_html/kmeans.html
Association analysis: Basic concept and algorithm page no 25-26;
Deep Learning: Feedforward Neural Nets and Convolutional Neural Nets Piyush Rai Machine Learning (CS771A) Nov 2, 2016
Deep Learning website. www.deeplearning.net
Classification with Deep Belief Networks HussamHebbo Jae Won Kim page no:20
Shin, H.C.; Orton, M.R.; Collins, D.J.; Doran, S.J.; Leach, M.O. Stacked Autoencoders for Unsupervised Feature Learning and Multiple Organ Detection in a Pilot Study Using 4D Patient Data. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 1930–1943. [CrossRef] [PubMed]
25. Sun, W.; Shao, S.; Zhao, R.; Yan, R.; Zhang, X.; Chen, X. A sparse auto-encoder-based deep neural network approach for induction motor faults classification. Measurement 2016, 89, 171–178. [CrossRef]
Comparison of Naive Basian and K-NN Classifier Deepak Kanojia Me (Cse) Tieit, Bhopal MahakMotwani Assistant Professor (Cse Department) Tieit, Bhopal Page no 46
L.W. Lan, A.Y. Kuo, “Development of a fuzzy neural network colour image vehicular detection (FNNCIVD) system”, IEEE 5th International Conference on Intelligent Transportation System, pp. 88–93, 2002.
S. Peng, C.A. Harlow, “A system for vehicle classification from range imagery”, Proceedings of the IEEE 28th Southeastern Symposium on System Theory, pp. 327–331, 1996.
M. Shaoqing, L. Zhengguang, J. Zhang, “Real-time vehicle classification method for multi lanes roads”, ICIEA 2009, pp. 960–964, 2009.
A study on the similarities of Deep Belief Networks and Stacked Autoencoders ANDREA DE GIORGIO page no: -70-79
AN APPLICATION OF DEEP BELIEF NETWORKS FOR 3-DIMENSIONAL IMAGE RECONSTRUCTION 1AMIN EMAMZADEH ESMAEILI NEJAD Engineering & Computer Science Department, Shiraz University, Shiraz, Iran page no: -8
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.