Skip to main content

2018 | OriginalPaper | Buchkapitel

A Survey of Machine Learning Algorithms and Their Application in Information Security

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this survey, we touch on the breadth of applications of machine learning to problems in information security. A wide variety of machine learning techniques are introduced, and a sample of the applications of each to security-related problems is briefly discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Observations are invariably known as “emissions” in a PHMM.
 
2
These VQ codebook vectors are not to be confused with a codebook cipher [82].
 
Literatur
2.
Zurück zum Zitat Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286CrossRef Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286CrossRef
3.
Zurück zum Zitat Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov models for speech, IDA-CRD, Princeton, pp 16–56 Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov models for speech, IDA-CRD, Princeton, pp 16–56
5.
Zurück zum Zitat Austin TH, Filiol E, Josse S, Stamp M (2013) Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii international conference on system sciences, HICSS 2013, Wailea, USA, 7–10 Jan 2013, pp 5039–5048. IEEE Computer Society?. https://doi.org/10.1109/HICSS.2013.217 Austin TH, Filiol E, Josse S, Stamp M (2013) Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii international conference on system sciences, HICSS 2013, Wailea, USA, 7–10 Jan 2013, pp 5039–5048. IEEE Computer Society?. https://​doi.​org/​10.​1109/​HICSS.​2013.​217
8.
Zurück zum Zitat Borello J-M, Mé L (2008) Code obfuscation techniques for metamorphic viruses. J Comput Virol 4(3):211–220CrossRef Borello J-M, Mé L (2008) Code obfuscation techniques for metamorphic viruses. J Comput Virol 4(3):211–220CrossRef
9.
Zurück zum Zitat Venkatachalam S, Stamp M (2011) Detecting undetectable metamorphic viruses. In: Proceedings of 2011 international conference on security & management. SAM’11, pp 340–345 Venkatachalam S, Stamp M (2011) Detecting undetectable metamorphic viruses. In: Proceedings of 2011 international conference on security & management. SAM’11, pp 340–345
12.
Zurück zum Zitat Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática, Universidad de la República de Uruguay, pp 46–60 Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática, Universidad de la República de Uruguay, pp 46–60
13.
Zurück zum Zitat Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: International conference on knowledge-based and intelligent information and engineering systems. Springer, Berlin, pp 821–829 Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: International conference on knowledge-based and intelligent information and engineering systems. Springer, Berlin, pp 821–829
14.
Zurück zum Zitat Posadas R, Mex-Perera C, Monroy R, Nolazco-Flores J (2006) Hybrid method for detecting masqueraders using session folding and hidden Markov models. In: Proceedings of the 5th Mexican international conference on artificial intelligence. MICAI’06. Springer, Berlin, pp 622–631 Posadas R, Mex-Perera C, Monroy R, Nolazco-Flores J (2006) Hybrid method for detecting masqueraders using session folding and hidden Markov models. In: Proceedings of the 5th Mexican international conference on artificial intelligence. MICAI’06. Springer, Berlin, pp 622–631
17.
Zurück zum Zitat Simova M, Stamp M, Pollett C (2005) Stealthy ciphertext. In: Arabnia HR, Joshua R (eds) Proceedings of the 2005 international conference on internet computing. ICOMP 2005. CSREA Press, pp 380–388 Simova M, Stamp M, Pollett C (2005) Stealthy ciphertext. In: Arabnia HR, Joshua R (eds) Proceedings of the 2005 international conference on internet computing. ICOMP 2005. CSREA Press, pp 380–388
22.
Zurück zum Zitat Sperotto A, Sadre R, de Boer P-T, Pras A (2007) Hidden Markov model modeling of SSH brute-force attacks. In: Bartolini C, Gaspary LP (eds) Proceedings of 20th IFIP/IEEE international workshop on distributed systems: operations and management (DSOM 2009). Lecture notes in computer science, vol 5841. Springer, Berlin, pp 164–176 Sperotto A, Sadre R, de Boer P-T, Pras A (2007) Hidden Markov model modeling of SSH brute-force attacks. In: Bartolini C, Gaspary LP (eds) Proceedings of 20th IFIP/IEEE international workshop on distributed systems: operations and management (DSOM 2009). Lecture notes in computer science, vol 5841. Springer, Berlin, pp 164–176
23.
Zurück zum Zitat Durbin R, Eddy S, Krogh A, Mitchison G (1998) Biological sequence analysis: probabilistic models of proteins and nucleic acids. Cambridge University Press, CambridgeCrossRef Durbin R, Eddy S, Krogh A, Mitchison G (1998) Biological sequence analysis: probabilistic models of proteins and nucleic acids. Cambridge University Press, CambridgeCrossRef
24.
Zurück zum Zitat Stamp M (2017) Introduction to machine learning with applications in information security. Chapman and hall/CRC, Boca RatonCrossRef Stamp M (2017) Introduction to machine learning with applications in information security. Chapman and hall/CRC, Boca RatonCrossRef
25.
Zurück zum Zitat Vemparala S, Troia FD, Visaggio CA, Austin TH, Stamp M (2016) Malware detection using dynamic birthmarks. In: Verma RM, Rusinowitch M (eds) Proceedings of the 2016 ACM on international workshop on security and privacy analytics, IWSPA 2016. ACM, USA, pp 41–46. https://doi.org/10.1145/2875475.2875476 Vemparala S, Troia FD, Visaggio CA, Austin TH, Stamp M (2016) Malware detection using dynamic birthmarks. In: Verma RM, Rusinowitch M (eds) Proceedings of the 2016 ACM on international workshop on security and privacy analytics, IWSPA 2016. ACM, USA, pp 41–46. https://​doi.​org/​10.​1145/​2875475.​2875476
27.
Zurück zum Zitat Ravi S, Balakrishnan N, Venkatesh B (2013) Behavior-based malware analysis using profile hidden Markov models. In: Proceedings of 2013 international conference on security and cryptography, SECRYPT Ravi S, Balakrishnan N, Venkatesh B (2013) Behavior-based malware analysis using profile hidden Markov models. In: Proceedings of 2013 international conference on security and cryptography, SECRYPT
29.
Zurück zum Zitat Pathan A-SK (2014) The state of the art in intrusion prevention and detection. Auerbach publications, Boston, USACrossRef Pathan A-SK (2014) The state of the art in intrusion prevention and detection. Auerbach publications, Boston, USACrossRef
30.
33.
41.
Zurück zum Zitat Nataraj L, Karthikeyan S, Jacob G, Manjunath BS (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, VizSec ’11. ACM, USA, pp. 4–147. https://doi.org/10.1145/2016904.2016908 Nataraj L, Karthikeyan S, Jacob G, Manjunath BS (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, VizSec ’11. ACM, USA, pp. 4–147. https://​doi.​org/​10.​1145/​2016904.​2016908
44.
Zurück zum Zitat Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM computing surveys (CSUR) 41(3):15CrossRef Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM computing surveys (CSUR) 41(3):15CrossRef
46.
Zurück zum Zitat Sprager S, Zazula D (2009) A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans Signal Process 5(11):369–378 Sprager S, Zazula D (2009) A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans Signal Process 5(11):369–378
48.
Zurück zum Zitat Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other Kernel-based learning methods. Cambridge University Press, CambridgeCrossRef Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other Kernel-based learning methods. Cambridge University Press, CambridgeCrossRef
52.
Zurück zum Zitat Firdausi I, lim C, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: Proceedings of the 2010 second international conference on advances in computing, control, and telecommunication technologies. ACT ’10. IEEE Computer Society, Washington, USA, pp. 201–203. https://doi.org/10.1109/ACT.2010.33 Firdausi I, lim C, Erwin A, Nugroho AS (2010) Analysis of machine learning techniques used in behavior-based malware detection. In: Proceedings of the 2010 second international conference on advances in computing, control, and telecommunication technologies. ACT ’10. IEEE Computer Society, Washington, USA, pp. 201–203. https://​doi.​org/​10.​1109/​ACT.​2010.​33
55.
Zurück zum Zitat Rieck K, Trinius P, Willems C, Holz T (2011) Automatic analysis of malware behavior using machine learning. J Comput Secur 19(4):639–668CrossRef Rieck K, Trinius P, Willems C, Holz T (2011) Automatic analysis of malware behavior using machine learning. J Comput Secur 19(4):639–668CrossRef
56.
Zurück zum Zitat Arp D, Spreitzenbarth M, Gascon H, Rieck K (2014) DREBIN: effective and explainable detection of android malware in your pocket Arp D, Spreitzenbarth M, Gascon H, Rieck K (2014) DREBIN: effective and explainable detection of android malware in your pocket
59.
Zurück zum Zitat Hu W (2003) Robust support vector machines for anomaly detection. In: Proceedings of 2003 international conference on machine learning and applications, ICMLA03, pp. 23–24 Hu W (2003) Robust support vector machines for anomaly detection. In: Proceedings of 2003 international conference on machine learning and applications, ICMLA03, pp. 23–24
61.
Zurück zum Zitat Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks, IJCNN’02, vol. 2. IEEE, USA, pp 1702–1707 Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks, IJCNN’02, vol. 2. IEEE, USA, pp 1702–1707
62.
Zurück zum Zitat Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5) Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5)
63.
Zurück zum Zitat Sohn T, Seo J, Moon J (2003) A study on the covert channel detection of tcp/ip header using support vector machine. In: Qing S, Gollmann D, Zhou J (eds) Information and communications security (ICICS 2003), vol 2836. Lecture notes in computer science. Springer, Berlin, pp 313–324CrossRef Sohn T, Seo J, Moon J (2003) A study on the covert channel detection of tcp/ip header using support vector machine. In: Qing S, Gollmann D, Zhou J (eds) Information and communications security (ICICS 2003), vol 2836. Lecture notes in computer science. Springer, Berlin, pp 313–324CrossRef
64.
Zurück zum Zitat Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. Proc SPIE 5306:35–45CrossRef Lyu S, Farid H (2004) Steganalysis using color wavelet statistics and one-class support vector machines. Proc SPIE 5306:35–45CrossRef
67.
Zurück zum Zitat Jain AK, Dubes RC (1988) Algorithms for Clustering Data. Prentice-Hall, USA Jain AK, Dubes RC (1988) Algorithms for Clustering Data. Prentice-Hall, USA
69.
Zurück zum Zitat Mooi E, Sarstedt M (2011) Cluster analysis. In: A concise guide to market research. Springer, Berlin, pp 237–284. Chap 9 Mooi E, Sarstedt M (2011) Cluster analysis. In: A concise guide to market research. Springer, Berlin, pp 237–284. Chap 9
70.
Zurück zum Zitat Tan P-N, Steinbach M, Kumar V (2005) 8. Cluster analysis: basic concepts and algorithms, pp. 487–568. Addison-Wesley, Boston (2005) Tan P-N, Steinbach M, Kumar V (2005) 8. Cluster analysis: basic concepts and algorithms, pp. 487–568. Addison-Wesley, Boston (2005)
77.
Zurück zum Zitat Wei C, Sprague A, Warner G (2009) Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. In: Proceedings of the 2009 ACM symposium on applied computing, SAC ’09. ACM, New York, USA, pp 889–890. https://doi.org/10.1145/1529282.1529473 Wei C, Sprague A, Warner G (2009) Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. In: Proceedings of the 2009 ACM symposium on applied computing, SAC ’09. ACM, New York, USA, pp 889–890. https://​doi.​org/​10.​1145/​1529282.​1529473
78.
Zurück zum Zitat Perdisci R, Lee W, Feamster N (2010) Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX conference on networked systems design and implementation, NSDI’10. USENIX Association, Berkeley, USA, pp. 26–26. http://dl.acm.org/citation.cfm?id=1855711.1855737 Perdisci R, Lee W, Feamster N (2010) Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX conference on networked systems design and implementation, NSDI’10. USENIX Association, Berkeley, USA, pp. 26–26. http://​dl.​acm.​org/​citation.​cfm?​id=​1855711.​1855737
79.
Zurück zum Zitat Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS workshop on data mining applied to security (DMSA-2001), pp 5–8 Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS workshop on data mining applied to security (DMSA-2001), pp 5–8
81.
Zurück zum Zitat Vaidya J, Clifton C (2003) Privacy-preserving \(k\)-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’03. ACM, New York, USA, pp. 206–215. https://doi.org/10.1145/956750.956776 Vaidya J, Clifton C (2003) Privacy-preserving \(k\)-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’03. ACM, New York, USA, pp. 206–215. https://​doi.​org/​10.​1145/​956750.​956776
82.
Zurück zum Zitat Stamp M (2011) Information security: principles and practice, 2nd edn. Wiley, USA (2011) Stamp M (2011) Information security: principles and practice, 2nd edn. Wiley, USA (2011)
83.
Zurück zum Zitat Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRef Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95CrossRef
84.
Zurück zum Zitat Chen T-S, Chang C-C, Hwang M-S (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488MathSciNetCrossRef Chen T-S, Chang C-C, Hwang M-S (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488MathSciNetCrossRef
85.
Zurück zum Zitat Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proces 6(12):1673–1687CrossRef Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proces 6(12):1673–1687CrossRef
86.
Zurück zum Zitat Chang C-C, Tai W-L, Lin M-H (2005) A reversible data hiding scheme with modified side match vector quantization. In: 19th international conference on advanced information networking and applications, AINA 2005, vol. 1. IEEE, USA, pp. 947–952 Chang C-C, Tai W-L, Lin M-H (2005) A reversible data hiding scheme with modified side match vector quantization. In: 19th international conference on advanced information networking and applications, AINA 2005, vol. 1. IEEE, USA, pp. 947–952
87.
Zurück zum Zitat Zheng J, Hu M (2006) An anomaly intrusion detection system based on vector quantization. IEICE Trans Inf Syst 89(1):201–210CrossRef Zheng J, Hu M (2006) An anomaly intrusion detection system based on vector quantization. IEICE Trans Inf Syst 89(1):201–210CrossRef
88.
Zurück zum Zitat Ichino M, Kawamoto K, Iwano T, Hatada M, Yoshiura H (2015) Evaluating header information features for malware infection detection. J Inf Process 23(5):603–612 Ichino M, Kawamoto K, Iwano T, Hatada M, Yoshiura H (2015) Evaluating header information features for malware infection detection. J Inf Process 23(5):603–612
94.
Zurück zum Zitat Kan M, Shan S, Xu D, Chen X (2011) Side-information based linear discriminant analysis for face recognition. BMVC 11:1–12 Kan M, Shan S, Xu D, Chen X (2011) Side-information based linear discriminant analysis for face recognition. BMVC 11:1–12
96.
Zurück zum Zitat Lu J, Plataniotis KN, Venetsanopoulos AN (2005) Regularization studies of linear discriminant analysis in small sample size scenarios with application to face recognition. Pattern Recog Lett 26(2):181–191CrossRef Lu J, Plataniotis KN, Venetsanopoulos AN (2005) Regularization studies of linear discriminant analysis in small sample size scenarios with application to face recognition. Pattern Recog Lett 26(2):181–191CrossRef
97.
Zurück zum Zitat Boulgouris NV, Chi ZX (2007) Gait recognition using radon transform and linear discriminant analysis. IEEE Trans Image Process 16(3):731–740MathSciNetCrossRef Boulgouris NV, Chi ZX (2007) Gait recognition using radon transform and linear discriminant analysis. IEEE Trans Image Process 16(3):731–740MathSciNetCrossRef
99.
Zurück zum Zitat Liao Y, Vemuri VR (2002) Use of \(k\)-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439–448CrossRef Liao Y, Vemuri VR (2002) Use of \(k\)-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439–448CrossRef
100.
Zurück zum Zitat Hu J, Gingrich D, Sentosa A (2008) A \(k\)-nearest neighbor approach for user authentication through biometric keystroke dynamics. In: IEEE international conference on communications, ICC’08. IEEE, USA, pp 1556–1560 Hu J, Gingrich D, Sentosa A (2008) A \(k\)-nearest neighbor approach for user authentication through biometric keystroke dynamics. In: IEEE international conference on communications, ICC’08. IEEE, USA, pp 1556–1560
101.
Zurück zum Zitat Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure \(k\)-nearest neighbor query over encrypted data in outsourced environments. In: 30th international conference on data engineering, ICDE 2014. IEEE, USA, pp 664–675 Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure \(k\)-nearest neighbor query over encrypted data in outsourced environments. In: 30th international conference on data engineering, ICDE 2014. IEEE, USA, pp 664–675
103.
Zurück zum Zitat Liaw A, Wiener M (2011) Classification and regression by randomforest. R News 2(3):18–22 Liaw A, Wiener M (2011) Classification and regression by randomforest. R News 2(3):18–22
106.
Zurück zum Zitat Thaseen S, Kumar CA (2013) An analysis of supervised tree based classifiers for intrusion detection system. In: 2013 International conference on pattern recognition, informatics and mobile engineering, PRIME 2013. IEEE, USA, pp 294–299 Thaseen S, Kumar CA (2013) An analysis of supervised tree based classifiers for intrusion detection system. In: 2013 International conference on pattern recognition, informatics and mobile engineering, PRIME 2013. IEEE, USA, pp 294–299
107.
Zurück zum Zitat Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests. In: Proceedings of the first international conference on availability, reliability and security, ARES ’06. IEEE, USA, pp 262–269. https://doi.org/10.1109/ARES.2006.7 Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests. In: Proceedings of the first international conference on availability, reliability and security, ARES ’06. IEEE, USA, pp 262–269. https://​doi.​org/​10.​1109/​ARES.​2006.​7
108.
Zurück zum Zitat Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82MathSciNetCrossRef Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG (2013) Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf Sci 231:64–82MathSciNetCrossRef
109.
Zurück zum Zitat Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Álvarez G (2013) Puma: permission usage to detect malware in Android. In: International joint conference CISIS12-ICEUTE\({}^\prime \) 12-SOCO\({}^\prime \), vol. 189. Springer, Berlin, pp 289–298 Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Álvarez G (2013) Puma: permission usage to detect malware in Android. In: International joint conference CISIS12-ICEUTE\({}^\prime \) 12-SOCO\({}^\prime \), vol. 189. Springer, Berlin, pp 289–298
110.
Zurück zum Zitat Shabtai A, Fledel Y, Elovici Y (2010) Automated static code analysis for classifying Android applications using machine learning. In: International conference on computational intelligence and security, CIS 2010. IEEE, USA, pp 329–333 Shabtai A, Fledel Y, Elovici Y (2010) Automated static code analysis for classifying Android applications using machine learning. In: International conference on computational intelligence and security, CIS 2010. IEEE, USA, pp 329–333
111.
Zurück zum Zitat Smutz C, Stavrou A (2012) Malicious pdf detection using metadata and structural features. In: Proceedings of the 28th annual computer security applications conference. ACM, USA, pp 239–248 Smutz C, Stavrou A (2012) Malicious pdf detection using metadata and structural features. In: Proceedings of the 28th annual computer security applications conference. ACM, USA, pp 239–248
112.
Zurück zum Zitat Ma L, Ofoghi B, Watters P, Brown S (2009) Detecting phishing emails using hybrid features. In: Symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC’09. IEEE, USA, pp 493–497 Ma L, Ofoghi B, Watters P, Brown S (2009) Detecting phishing emails using hybrid features. In: Symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC’09. IEEE, USA, pp 493–497
113.
Zurück zum Zitat Ghosal V, Tikmani P, Gupta P (2009) Face classification using Gabor wavelets and random forest. In: Canadian conference on computer and robot vision, CRV’09. IEEE, USA, pp 68–73 Ghosal V, Tikmani P, Gupta P (2009) Face classification using Gabor wavelets and random forest. In: Canadian conference on computer and robot vision, CRV’09. IEEE, USA, pp 68–73
114.
Zurück zum Zitat Nguyen VH, Tran LMS (2010) Predicting vulnerable software components with dependency graphs. In: Proceedings of the 6th international workshop on security measurements and metrics. ACM, USA, p 3 Nguyen VH, Tran LMS (2010) Predicting vulnerable software components with dependency graphs. In: Proceedings of the 6th international workshop on security measurements and metrics. ACM, USA, p 3
117.
Zurück zum Zitat Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cyber Part B (Cybernetics) 38(2): 577–583 Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cyber Part B (Cybernetics) 38(2): 577–583
118.
Zurück zum Zitat Miyamoto D, Hazeyama H, Kadobayashi Y (2007) A proposal of the adaboost-based detection of phishing sites. In: Proceedings of the joint workshop on information security Miyamoto D, Hazeyama H, Kadobayashi Y (2007) A proposal of the adaboost-based detection of phishing sites. In: Proceedings of the joint workshop on information security
119.
Zurück zum Zitat Aswini A, Vinod P (2014) Droid permission miner: Mining prominent permissions for android malware analysis. In: 2014 fifth international conference on the applications of digital information and web technologies (ICADIWT). IEEE, USA, pp. 81–86 Aswini A, Vinod P (2014) Droid permission miner: Mining prominent permissions for android malware analysis. In: 2014 fifth international conference on the applications of digital information and web technologies (ICADIWT). IEEE, USA, pp. 81–86
120.
Zurück zum Zitat Khan MS, Siddiqui S, McLeod RD, Ferens K, Kinsner W (2016) Fractal based adaptive boosting algorithm for cognitive detection of computer malware. In: 5th international conference on cognitive informatics & cognitive computing, ICCI*CC. IEEE, USA, pp 50–59 Khan MS, Siddiqui S, McLeod RD, Ferens K, Kinsner W (2016) Fractal based adaptive boosting algorithm for cognitive detection of computer malware. In: 5th international conference on cognitive informatics & cognitive computing, ICCI*CC. IEEE, USA, pp 50–59
121.
Zurück zum Zitat Yang P, Shan S, Gao W, Li SZ, Zhang D (2004) Face recognition using ada-boosted Gabor features. In: Proceedings of sixth IEEE international conference on automatic face and gesture recognition. IEEE, pp 356–361 Yang P, Shan S, Gao W, Li SZ, Zhang D (2004) Face recognition using ada-boosted Gabor features. In: Proceedings of sixth IEEE international conference on automatic face and gesture recognition. IEEE, pp 356–361
Metadaten
Titel
A Survey of Machine Learning Algorithms and Their Application in Information Security
verfasst von
Mark Stamp
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_2

Premium Partner