Skip to main content
Top

2018 | OriginalPaper | Chapter

A Survey of Machine Learning Algorithms and Their Application in Information Security

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this survey, we touch on the breadth of applications of machine learning to problems in information security. A wide variety of machine learning techniques are introduced, and a sample of the applications of each to security-related problems is briefly discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Observations are invariably known as “emissions” in a PHMM.
 
2
These VQ codebook vectors are not to be confused with a codebook cipher [82].
 
Literature
2.
go back to reference Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286CrossRef Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286CrossRef
3.
go back to reference Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov models for speech, IDA-CRD, Princeton, pp 16–56 Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov models for speech, IDA-CRD, Princeton, pp 16–56
5.
go back to reference Austin TH, Filiol E, Josse S, Stamp M (2013) Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii international conference on system sciences, HICSS 2013, Wailea, USA, 7–10 Jan 2013, pp 5039–5048. IEEE Computer Society?. https://doi.org/10.1109/HICSS.2013.217 Austin TH, Filiol E, Josse S, Stamp M (2013) Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii international conference on system sciences, HICSS 2013, Wailea, USA, 7–10 Jan 2013, pp 5039–5048. IEEE Computer Society?. https://​doi.​org/​10.​1109/​HICSS.​2013.​217
8.
go back to reference Borello J-M, Mé L (2008) Code obfuscation techniques for metamorphic viruses. J Comput Virol 4(3):211–220CrossRef Borello J-M, Mé L (2008) Code obfuscation techniques for metamorphic viruses. J Comput Virol 4(3):211–220CrossRef
9.
go back to reference Venkatachalam S, Stamp M (2011) Detecting undetectable metamorphic viruses. In: Proceedings of 2011 international conference on security & management. SAM’11, pp 340–345 Venkatachalam S, Stamp M (2011) Detecting undetectable metamorphic viruses. In: Proceedings of 2011 international conference on security & management. SAM’11, pp 340–345
12.
go back to reference Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática, Universidad de la República de Uruguay, pp 46–60 Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática, Universidad de la República de Uruguay, pp 46–60
13.
go back to reference Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: International conference on knowledge-based and intelligent information and engineering systems. Springer, Berlin, pp 821–829 Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: International conference on knowledge-based and intelligent information and engineering systems. Springer, Berlin, pp 821–829
14.
go back to reference Posadas R, Mex-Perera C, Monroy R, Nolazco-Flores J (2006) Hybrid method for detecting masqueraders using session folding and hidden Markov models. In: Proceedings of the 5th Mexican international conference on artificial intelligence. MICAI’06. Springer, Berlin, pp 622–631 Posadas R, Mex-Perera C, Monroy R, Nolazco-Flores J (2006) Hybrid method for detecting masqueraders using session folding and hidden Markov models. In: Proceedings of the 5th Mexican international conference on artificial intelligence. MICAI’06. Springer, Berlin, pp 622–631
17.
go back to reference Simova M, Stamp M, Pollett C (2005) Stealthy ciphertext. In: Arabnia HR, Joshua R (eds) Proceedings of the 2005 international conference on internet computing. ICOMP 2005. CSREA Press, pp 380–388 Simova M, Stamp M, Pollett C (2005) Stealthy ciphertext. In: Arabnia HR, Joshua R (eds) Proceedings of the 2005 international conference on internet computing. ICOMP 2005. CSREA Press, pp 380–388
22.
go back to reference Sperotto A, Sadre R, de Boer P-T, Pras A (2007) Hidden Markov model modeling of SSH brute-force attacks. In: Bartolini C, Gaspary LP (eds) Proceedings of 20th IFIP/IEEE international workshop on distributed systems: operations and management (DSOM 2009). Lecture notes in computer science, vol 5841. Springer, Berlin, pp 164–176 Sperotto A, Sadre R, de Boer P-T, Pras A (2007) Hidden Markov model modeling of SSH brute-force attacks. In: Bartolini C, Gaspary LP (eds) Proceedings of 20th IFIP/IEEE international workshop on distributed systems: operations and management (DSOM 2009). Lecture notes in computer science, vol 5841. Springer, Berlin, pp 164–176
23.
go back to reference Durbin R, Eddy S, Krogh A, Mitchison G (1998) Biological sequence analysis: probabilistic models of proteins and nucleic acids. Cambridge University Press, CambridgeCrossRef Durbin R, Eddy S, Krogh A, Mitchison G (1998) Biological sequence analysis: probabilistic models of proteins and nucleic acids. Cambridge University Press, CambridgeCrossRef
24.
go back to reference Stamp M (2017) Introduction to machine learning with applications in information security. Chapman and hall/CRC, Boca RatonCrossRef Stamp M (2017) Introduction to machine learning with applications in information security. Chapman and hall/CRC, Boca RatonCrossRef
25.
go back to reference Vemparala S, Troia FD, Visaggio CA, Austin TH, Stamp M (2016) Malware detection using dynamic birthmarks. In: Verma RM, Rusinowitch M (eds) Proceedings of the 2016 ACM on international workshop on security and privacy analytics, IWSPA 2016. ACM, USA, pp 41–46. https://doi.org/10.1145/2875475.2875476 Vemparala S, Troia FD, Visaggio CA, Austin TH, Stamp M (2016) Malware detection using dynamic birthmarks. In: Verma RM, Rusinowitch M (eds) Proceedings of the 2016 ACM on international workshop on security and privacy analytics, IWSPA 2016. ACM, USA, pp 41–46. https://​doi.​org/​10.​1145/​2875475.​2875476
27.
go back to reference Ravi S, Balakrishnan N, Venkatesh B (2013) Behavior-based malware analysis using profile hidden Markov models. In: Proceedings of 2013 international conference on security and cryptography, SECRYPT Ravi S, Balakrishnan N, Venkatesh B (2013) Behavior-based malware analysis using profile hidden Markov models. In: Proceedings of 2013 international conference on security and cryptography, SECRYPT
29.
go back to reference Pathan A-SK (2014) The state of the art in intrusion prevention and detection. Auerbach publications, Boston, USACrossRef Pathan A-SK (2014) The state of the art in intrusion prevention and detection. Auerbach publications, Boston, USACrossRef
30.
41.
go back to reference Nataraj L, Karthikeyan S, Jacob G, Manjunath BS (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, VizSec ’11. ACM, USA, pp. 4–147. https://doi.org/10.1145/2016904.2016908 Nataraj L, Karthikeyan S, Jacob G, Manjunath BS (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, VizSec ’11. ACM, USA, pp. 4–147. https://​doi.​org/​10.​1145/​2016904.​2016908
44.
go back to reference Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM computing surveys (CSUR) 41(3):15CrossRef Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM computing surveys (CSUR) 41(3):15CrossRef
46.
go back to reference Sprager S, Zazula D (2009) A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans Signal Process 5(11):369–378 Sprager S, Zazula D (2009) A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans Signal Process 5(11):369–378
48.
go back to reference Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other Kernel-based learning methods. Cambridge University Press, CambridgeCrossRef Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other Kernel-based learning methods. Cambridge University Press, CambridgeCrossRef
52.
go back to reference Firdausi I, lim C, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: Proceedings of the 2010 second international conference on advances in computing, control, and telecommunication technologies. ACT ’10. IEEE Computer Society, Washington, USA, pp. 201–203. https://doi.org/10.1109/ACT.2010.33 Firdausi I, lim C, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: Proceedings of the 2010 second international conference on advances in computing, control, and telecommunication technologies. ACT ’10. IEEE Computer Society, Washington, USA, pp. 201–203. https://​doi.​org/​10.​1109/​ACT.​2010.​33
55.
go back to reference Rieck K, Trinius P, Willems C, Holz T (2011) Automatic analysis of malware behavior using machine learning. J Comput Secur 19(4):639–668CrossRef Rieck K, Trinius P, Willems C, Holz T (2011) Automatic analysis of malware behavior using machine learning. J Comput Secur 19(4):639–668CrossRef
56.
go back to reference Arp D, Spreitzenbarth M, Gascon H, Rieck K (2014) DREBIN: effective and explainable detection of android malware in your pocket Arp D, Spreitzenbarth M, Gascon H, Rieck K (2014) DREBIN: effective and explainable detection of android malware in your pocket
59.
go back to reference Hu W (2003) Robust support vector machines for anomaly detection. In: Proceedings of 2003 international conference on machine learning and applications, ICMLA03, pp. 23–24 Hu W (2003) Robust support vector machines for anomaly detection. In: Proceedings of 2003 international conference on machine learning and applications, ICMLA03, pp. 23–24
61.
go back to reference Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks, IJCNN’02, vol. 2. IEEE, USA, pp 1702–1707 Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks, IJCNN’02, vol. 2. IEEE, USA, pp 1702–1707
62.
go back to reference Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5) Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5)
63.
go back to reference Sohn T, Seo J, Moon J (2003) A study on the covert channel detection of tcp/ip header using support vector machine. In: Qing S, Gollmann D, Zhou J (eds) Information and communications security (ICICS 2003), vol 2836. Lecture notes in computer science. Springer, Berlin, pp 313–324CrossRef Sohn T, Seo J, Moon J (2003) A study on the covert channel detection of tcp/ip header using support vector machine. In: Qing S, Gollmann D, Zhou J (eds) Information and communications security (ICICS 2003), vol 2836. Lecture notes in computer science. Springer, Berlin, pp 313–324CrossRef
64.
go back to reference Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. Proc SPIE 5306:35–45CrossRef Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. Proc SPIE 5306:35–45CrossRef
67.
go back to reference Jain AK, Dubes RC (1988) Algorithms for Clustering Data. Prentice-Hall, USA Jain AK, Dubes RC (1988) Algorithms for Clustering Data. Prentice-Hall, USA
69.
go back to reference Mooi E, Sarstedt M (2011) Cluster analysis. In: A concise guide to market research. Springer, Berlin, pp 237–284. Chap 9 Mooi E, Sarstedt M (2011) Cluster analysis. In: A concise guide to market research. Springer, Berlin, pp 237–284. Chap 9
70.
go back to reference Tan P-N, Steinbach M, Kumar V (2005) 8. Cluster analysis: basic concepts and algorithms, pp. 487–568. Addison-Wesley, Boston (2005) Tan P-N, Steinbach M, Kumar V (2005) 8. Cluster analysis: basic concepts and algorithms, pp. 487–568. Addison-Wesley, Boston (2005)
77.
78.
go back to reference Perdisci R, Lee W, Feamster N (2010) Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX conference on networked systems design and implementation, NSDI’10. USENIX Association, Berkeley, USA, pp. 26–26. http://dl.acm.org/citation.cfm?id=1855711.1855737 Perdisci R, Lee W, Feamster N (2010) Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX conference on networked systems design and implementation, NSDI’10. USENIX Association, Berkeley, USA, pp. 26–26. http://​dl.​acm.​org/​citation.​cfm?​id=​1855711.​1855737
79.
go back to reference Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS workshop on data mining applied to security (DMSA-2001), pp 5–8 Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS workshop on data mining applied to security (DMSA-2001), pp 5–8
81.
go back to reference Vaidya J, Clifton C (2003) Privacy-preserving \(k\)-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’03. ACM, New York, USA, pp. 206–215. https://doi.org/10.1145/956750.956776 Vaidya J, Clifton C (2003) Privacy-preserving \(k\)-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’03. ACM, New York, USA, pp. 206–215. https://​doi.​org/​10.​1145/​956750.​956776
82.
go back to reference Stamp M (2011) Information security: principles and practice, 2nd edn. Wiley, USA (2011) Stamp M (2011) Information security: principles and practice, 2nd edn. Wiley, USA (2011)
83.
go back to reference Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRef Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRef
84.
go back to reference Chen T-S, Chang C-C, Hwang M-S (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488MathSciNetCrossRef Chen T-S, Chang C-C, Hwang M-S (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488MathSciNetCrossRef
85.
go back to reference Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proces 6(12):1673–1687CrossRef Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proces 6(12):1673–1687CrossRef
86.
go back to reference Chang C-C, Tai W-L, Lin M-H (2005) A reversible data hiding scheme with modified side match vector quantization. In: 19th international conference on advanced information networking and applications, AINA 2005, vol. 1. IEEE, USA, pp. 947–952 Chang C-C, Tai W-L, Lin M-H (2005) A reversible data hiding scheme with modified side match vector quantization. In: 19th international conference on advanced information networking and applications, AINA 2005, vol. 1. IEEE, USA, pp. 947–952
87.
go back to reference Zheng J, Hu M (2006) An anomaly intrusion detection system based on vector quantization. IEICE Trans Inf Syst 89(1):201–210CrossRef Zheng J, Hu M (2006) An anomaly intrusion detection system based on vector quantization. IEICE Trans Inf Syst 89(1):201–210CrossRef
88.
go back to reference Ichino M, Kawamoto K, Iwano T, Hatada M, Yoshiura H (2015) Evaluating header information features for malware infection detection. J Inf Process 23(5):603–612 Ichino M, Kawamoto K, Iwano T, Hatada M, Yoshiura H (2015) Evaluating header information features for malware infection detection. J Inf Process 23(5):603–612
94.
go back to reference Kan M, Shan S, Xu D, Chen X (2011) Side-information based linear discriminant analysis for face recognition. BMVC 11:1–12 Kan M, Shan S, Xu D, Chen X (2011) Side-information based linear discriminant analysis for face recognition. BMVC 11:1–12
96.
go back to reference Lu J, Plataniotis KN, Venetsanopoulos AN (2005) Regularization studies of linear discriminant analysis in small sample size scenarios with application to face recognition. Pattern Recog Lett 26(2):181–191CrossRef Lu J, Plataniotis KN, Venetsanopoulos AN (2005) Regularization studies of linear discriminant analysis in small sample size scenarios with application to face recognition. Pattern Recog Lett 26(2):181–191CrossRef
97.
go back to reference Boulgouris NV, Chi ZX (2007) Gait recognition using radon transform and linear discriminant analysis. IEEE Trans Image Process 16(3):731–740MathSciNetCrossRef Boulgouris NV, Chi ZX (2007) Gait recognition using radon transform and linear discriminant analysis. IEEE Trans Image Process 16(3):731–740MathSciNetCrossRef
99.
go back to reference Liao Y, Vemuri VR (2002) Use of \(k\)-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439–448CrossRef Liao Y, Vemuri VR (2002) Use of \(k\)-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439–448CrossRef
100.
go back to reference Hu J, Gingrich D, Sentosa A (2008) A \(k\)-nearest neighbor approach for user authentication through biometric keystroke dynamics. In: IEEE international conference on communications, ICC’08. IEEE, USA, pp 1556–1560 Hu J, Gingrich D, Sentosa A (2008) A \(k\)-nearest neighbor approach for user authentication through biometric keystroke dynamics. In: IEEE international conference on communications, ICC’08. IEEE, USA, pp 1556–1560
101.
go back to reference Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure \(k\)-nearest neighbor query over encrypted data in outsourced environments. In: 30th international conference on data engineering, ICDE 2014. IEEE, USA, pp 664–675 Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure \(k\)-nearest neighbor query over encrypted data in outsourced environments. In: 30th international conference on data engineering, ICDE 2014. IEEE, USA, pp 664–675
103.
go back to reference Liaw A, Wiener M (2011) Classification and regression by randomforest. R News 2(3):18–22 Liaw A, Wiener M (2011) Classification and regression by randomforest. R News 2(3):18–22
106.
go back to reference Thaseen S, Kumar CA (2013) An analysis of supervised tree based classifiers for intrusion detection system. In: 2013 International conference on pattern recognition, informatics and mobile engineering, PRIME 2013. IEEE, USA, pp 294–299 Thaseen S, Kumar CA (2013) An analysis of supervised tree based classifiers for intrusion detection system. In: 2013 International conference on pattern recognition, informatics and mobile engineering, PRIME 2013. IEEE, USA, pp 294–299
107.
go back to reference Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests. In: Proceedings of the first international conference on availability, reliability and security, ARES ’06. IEEE, USA, pp 262–269. https://doi.org/10.1109/ARES.2006.7 Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests. In: Proceedings of the first international conference on availability, reliability and security, ARES ’06. IEEE, USA, pp 262–269. https://​doi.​org/​10.​1109/​ARES.​2006.​7
108.
go back to reference Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82MathSciNetCrossRef Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82MathSciNetCrossRef
109.
go back to reference Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Álvarez G (2013) Puma: permission usage to detect malware in Android. In: International joint conference CISIS12-ICEUTE\({}^\prime \) 12-SOCO\({}^\prime \), vol. 189. Springer, Berlin, pp 289–298 Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Álvarez G (2013) Puma: permission usage to detect malware in Android. In: International joint conference CISIS12-ICEUTE\({}^\prime \) 12-SOCO\({}^\prime \), vol. 189. Springer, Berlin, pp 289–298
110.
go back to reference Shabtai A, Fledel Y, Elovici Y (2010) Automated static code analysis for classifying Android applications using machine learning. In: International conference on computational intelligence and security, CIS 2010. IEEE, USA, pp 329–333 Shabtai A, Fledel Y, Elovici Y (2010) Automated static code analysis for classifying Android applications using machine learning. In: International conference on computational intelligence and security, CIS 2010. IEEE, USA, pp 329–333
111.
go back to reference Smutz C, Stavrou A (2012) Malicious pdf detection using metadata and structural features. In: Proceedings of the 28th annual computer security applications conference. ACM, USA, pp 239–248 Smutz C, Stavrou A (2012) Malicious pdf detection using metadata and structural features. In: Proceedings of the 28th annual computer security applications conference. ACM, USA, pp 239–248
112.
go back to reference Ma L, Ofoghi B, Watters P, Brown S (2009) Detecting phishing emails using hybrid features. In: Symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC’09. IEEE, USA, pp 493–497 Ma L, Ofoghi B, Watters P, Brown S (2009) Detecting phishing emails using hybrid features. In: Symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC’09. IEEE, USA, pp 493–497
113.
go back to reference Ghosal V, Tikmani P, Gupta P (2009) Face classification using Gabor wavelets and random forest. In: Canadian conference on computer and robot vision, CRV’09. IEEE, USA, pp 68–73 Ghosal V, Tikmani P, Gupta P (2009) Face classification using Gabor wavelets and random forest. In: Canadian conference on computer and robot vision, CRV’09. IEEE, USA, pp 68–73
114.
go back to reference Nguyen VH, Tran LMS (2010) Predicting vulnerable software components with dependency graphs. In: Proceedings of the 6th international workshop on security measurements and metrics. ACM, USA, p 3 Nguyen VH, Tran LMS (2010) Predicting vulnerable software components with dependency graphs. In: Proceedings of the 6th international workshop on security measurements and metrics. ACM, USA, p 3
117.
go back to reference Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cyber Part B (Cybernetics) 38(2): 577–583 Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cyber Part B (Cybernetics) 38(2): 577–583
118.
go back to reference Miyamoto D, Hazeyama H, Kadobayashi Y (2007) A proposal of the adaboost-based detection of phishing sites. In: Proceedings of the joint workshop on information security Miyamoto D, Hazeyama H, Kadobayashi Y (2007) A proposal of the adaboost-based detection of phishing sites. In: Proceedings of the joint workshop on information security
119.
go back to reference Aswini A, Vinod P (2014) Droid permission miner: Mining prominent permissions for android malware analysis. In: 2014 fifth international conference on the applications of digital information and web technologies (ICADIWT). IEEE, USA, pp. 81–86 Aswini A, Vinod P (2014) Droid permission miner: Mining prominent permissions for android malware analysis. In: 2014 fifth international conference on the applications of digital information and web technologies (ICADIWT). IEEE, USA, pp. 81–86
120.
go back to reference Khan MS, Siddiqui S, McLeod RD, Ferens K, Kinsner W (2016) Fractal based adaptive boosting algorithm for cognitive detection of computer malware. In: 5th international conference on cognitive informatics & cognitive computing, ICCI*CC. IEEE, USA, pp 50–59 Khan MS, Siddiqui S, McLeod RD, Ferens K, Kinsner W (2016) Fractal based adaptive boosting algorithm for cognitive detection of computer malware. In: 5th international conference on cognitive informatics & cognitive computing, ICCI*CC. IEEE, USA, pp 50–59
121.
go back to reference Yang P, Shan S, Gao W, Li SZ, Zhang D (2004) Face recognition using ada-boosted Gabor features. In: Proceedings of sixth IEEE international conference on automatic face and gesture recognition. IEEE, pp 356–361 Yang P, Shan S, Gao W, Li SZ, Zhang D (2004) Face recognition using ada-boosted Gabor features. In: Proceedings of sixth IEEE international conference on automatic face and gesture recognition. IEEE, pp 356–361
Metadata
Title
A Survey of Machine Learning Algorithms and Their Application in Information Security
Author
Mark Stamp
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_2

Premium Partner