MACHINE LEARNING APPROACH TO ANOMALY DETECTION IN CYBER SECURITY WITH A CASE STUDY OF SPAMMING ATTACK

Now the standalone computer and information flow in the internet are sources continues to expose an increasing number of security threats and causes to create a nonrecoverable victims with new types of attacks continuously injecting into the network applications. For this to develop a robust, flexible and adaptive security solution is a severe challenge. In this context, anomaly detection technique is an advanced adornment technique to protect data stored in the systems and while flow in the networks against malicious actions. Anomaly detection is an area of information security that has received much attention in recent years applying to most emerging applications. So in this paper we are going to elaborate a latest technique available in machine learning applied to anomaly detection which is used to thwarts the latest attacks created by attackers and here the spam is also a type of anomaly and it is classified as legitimate (ham) or spam. Finally a case study is discussed on latest spamming attacks infected on top web domains and countries in the world motivated by a traditional security ethic are awareness.

[1]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[2]  Sachin J. Pukale,et al.  A REVIEW OF ANOMALY BASED INTRUSIONS DETECTION IN MULTI-TIER WEB APPLICATIONS , 2012 .

[3]  Pollachi Main Road BEHAVIORAL AND PERFORMANCE ANALYSIS MODEL FOR MALWARE DETECTION TECHNIQUES , 2013 .

[4]  Zoubin Ghahramani,et al.  An Introduction to Hidden Markov Models and Bayesian Networks , 2001, Int. J. Pattern Recognit. Artif. Intell..

[5]  Thomas G. Dietterich,et al.  Readings in Machine Learning , 1991 .

[6]  Terran Lane,et al.  An Application of Machine Learning to Anomaly Detection , 1999 .

[7]  Weibo Gong,et al.  Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..

[8]  David A. Wagner,et al.  Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[9]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[10]  Christopher Krügel,et al.  Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[11]  Jason Hong,et al.  The state of phishing attacks , 2012, Commun. ACM.

[12]  A. Christy INTEGRATION OF FEATURE SETS WITH MACHINE LEARNING TECHNIQUES FOR SPAM FILTERING , 2011 .

[13]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[14]  Alfonso Valdes,et al.  Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.

[15]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[16]  Sushil Jajodia,et al.  Integrating Data Mining Techniques with Intrusion Detection Methods , 1999, DBSec.

[17]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[18]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[19]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[20]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).