Full Paper View Go Back

Review Paper on Shallow Learning and Deep Learning Methods for Network security

Afzal Ahmad1 , Mohammad Asif2 , Shaikh Rohan Ali3

  1. Computer Dept. Jamia Polytechnic, MSBTE, Mumbai, India.
  2. Computer Department, Jamia Institute of Engineering & Management Studies, N.M.U., Jalgaon, India.
  3. Computer Department, Jamia Institute of Engineering & Management Studies, N.M.U., Jalgaon, India.

Section:Review Paper, Product Type: Isroset-Journal
Vol.6 , Issue.5 , pp.45-54, Oct-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i5.4554


Online published on Oct 31, 2018


Copyright © Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali, “Review Paper on Shallow Learning and Deep Learning Methods for Network security,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.45-54, 2018.

MLA Style Citation: Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali "Review Paper on Shallow Learning and Deep Learning Methods for Network security." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 45-54.

APA Style Citation: Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali, (2018). Review Paper on Shallow Learning and Deep Learning Methods for Network security. International Journal of Scientific Research in Computer Science and Engineering, 6(5), 45-54.

BibTex Style Citation:
@article{Ahmad_2018,
author = {Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali},
title = {Review Paper on Shallow Learning and Deep Learning Methods for Network security},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {45-54},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=860},
doi = {https://doi.org/10.26438/ijcse/v6i5.4554}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.4554}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=860
TI - Review Paper on Shallow Learning and Deep Learning Methods for Network security
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 45-54
IS - 5
VL - 6
SN - 2347-2693
ER -

897 Views    517 Downloads    111 Downloads
  
  

Abstract :
Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks with the objective of supporting or notwithstanding supplanting the principal level of security experts although the total mechanization of identification and examination is a luring objective, the adequacy of machine learning in digital security must be assessed with the due steadiness. With the improvement of the Internet, digital assaults are changing quickly and the digital security circumstance isn`t hopeful. Since information are so critical in ML/DL strategies, we portray a portion of the normally utilized system datasets utilized in ML/DL, examine the difficulties of utilizing ML/DL for digital security and give recommendations to look into bearings. Malware has developed over the previous decades including novel engendering vectors, strong versatility methods and also different and progressively propelled assault procedures. The most recent manifestation of malware is the infamous bot malware that furnish the aggressor with the capacity to remotely control traded off machines therefore making them a piece of systems of bargained machines otherwise called botnets. Bot malware depend on the Internet for proliferation, speaking with the remote assailant and executing assorted noxious exercises. As system movement action is one of the principle characteristics of malware and botnet task, activity investigation is frequently observed as one of the key methods for recognizing traded off machines inside the system. We present an examination, routed to security experts, of machine learning methods connected to the recognition of interruption, malware, and spam.

Key-Words / Index Term :
Machine learning, Deep learning, Cyber security, Adversarial learning

References :
[1] S. Aftergood, ``Cybersecurity: The cold war online,`` Nature, vol. 547,no. 7661, pp. 30_31, Jul. 2017.
[2] M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and prospects,” Science, 2015.
[3] A. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, 2015.
[4] E. Blanzieri and A. Bryl, “A survey of learning-based techniques of email spam filtering,” Artificial Intelligence Review, 2008.
[5] J. Gardiner and S. Nagaraja, “On the Security of Machine Learning in Malware C8C Detection,” ACM Computing Surveys, 2016.
[6] R. G. Smith and J. Eckroth, ``Building AI applications: Yesterday, today, and tomorrow,`` AI Mag., vol. 31, no. 1, pp. 6_22, 2017.
[7] P. Louridas and C. Ebert, ``Machine learning,`` IEEE Softw., vol. 33, no. 5,pp. 110115, Sep./Oct. 2016.
[8] M. I. Jordan and T. M. Mitchell, ``Machine learning: Trends, perspectives, and prospects,`` Science, vol. 349, no. 6245, pp. 255260, 2015.
[9] Y. LeCun, Y. Bengio, and G. Hinton, ``Deep learning,`` Nature, vol. 521,pp. 429444, May 2015.
[10] M. Roesch. Snort-lightweight intrusion detection for networks. In Proceedingsof the 13th USENIX Conference on System Administration, pages229-231. Seattle, Washington, 1999.
[11] M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. Thenids cluster: Scalable, stateful network intrusion detection on commodityhardware. Lecture Notes in Computer Science, 4630:107-126, 2007.
[12] S. Zanero and S. Savaresi. Unsupervised learning techniques for an intrusion detection system. In SAC `04: Proceedings of the 2004 ACM symposium on Applied computing, pages 412-419, New York, NY, USA, 2004. ACM. ISBN 1-58113-812-1. doi: http://doi:acm:org/10:1145/967900:967988.
[13] S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC), 3(3),2000.
[14] R. Bace and P. Mell. Intrusion detection systems. Technical Report 800-31, National Institute of Standards and Technology (NIST), Special Publication,2001.
[15] S.B. Kotsiantis, D. Kanellopoulos, and P.E. Pintelas. Data preprocessing for supervised learning. International Journal of Computer Science, 1(2): 111-117, 2006.
[16] W. Lee and S.J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227-261, 2000.
[12] 6 Easy Steps to Learn Naive Bayes Algorithm (with codes in Python and R)SUNIL RAY, SEPTEMBER 11, 2017 https://www.analyticsvidhya.com/blog/2017/09/naive-bayes-explained/
[13] Introduction to k-Nearest Neighbors: Simplified (with implementation in Python)TAVISH SRIVASTAVA, MARCH 26, 2018 https://www.analyticsvidhya.com/blog/2018/03/introduction-k-neighbours-algorithm-clustering/
[14] Going Deeper in Spiking Neural Networks: VGG and Residual Architectures AbhronilSenguptaa,∗ , YutingYeb , Robert Wangb , ChiaoLiub , Kaushik Roya aPurdue University, West Lafayette, IN, USA bFacebook Reality Labs, Redmond, WA, USA
[15]An Introduction to Clustering and different methods of clustering SAURAV KAUSHIK, NOVEMBER 3, 2016
[16] A Tutorial on Clustering Algorithms https://home.deib.polimi.it/matteucc/Clustering/tutorial_html/kmeans.html
[17] Association analysis: Basic concept and algorithm page no 25-26;
[18] Deep Learning: Feedforward Neural Nets and Convolutional Neural Nets Piyush Rai Machine Learning (CS771A) Nov 2, 2016
[19] Deep Learning website. www.deeplearning.net
[20] Classification with Deep Belief Networks HussamHebbo Jae Won Kim page no:20
[23] Shin, H.C.; Orton, M.R.; Collins, D.J.; Doran, S.J.; Leach, M.O. Stacked Autoencoders for Unsupervised Feature Learning and Multiple Organ Detection in a Pilot Study Using 4D Patient Data. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 1930–1943. [CrossRef] [PubMed]
[25] 25. Sun, W.; Shao, S.; Zhao, R.; Yan, R.; Zhang, X.; Chen, X. A sparse auto-encoder-based deep neural network approach for induction motor faults classification. Measurement 2016, 89, 171–178. [CrossRef]
[26] Comparison of Naive Basian and K-NN Classifier Deepak Kanojia Me (Cse) Tieit, Bhopal MahakMotwani Assistant Professor (Cse Department) Tieit, Bhopal Page no 46
[29] L.W. Lan, A.Y. Kuo, “Development of a fuzzy neural network colour image vehicular detection (FNNCIVD) system”, IEEE 5th International Conference on Intelligent Transportation System, pp. 88–93, 2002.
[30] S. Peng, C.A. Harlow, “A system for vehicle classification from range imagery”, Proceedings of the IEEE 28th Southeastern Symposium on System Theory, pp. 327–331, 1996.
[31] M. Shaoqing, L. Zhengguang, J. Zhang, “Real-time vehicle classification method for multi lanes roads”, ICIEA 2009, pp. 960–964, 2009.
[32] A study on the similarities of Deep Belief Networks and Stacked Autoencoders ANDREA DE GIORGIO page no: -70-79
[33] AN APPLICATION OF DEEP BELIEF NETWORKS FOR 3-DIMENSIONAL IMAGE RECONSTRUCTION 1AMIN EMAMZADEH ESMAEILI NEJAD Engineering & Computer Science Department, Shiraz University, Shiraz, Iran page no: -8

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation