Skip to main content

2014 | OriginalPaper | Buchkapitel

Machine Learning Applied to Cyber Operations

verfasst von : Misty Blowers, Jonathan Williams

Erschienen in: Network Science and Cybersecurity

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber attacks have evolved from operational to strategic events, with the aim to disrupt and influence strategic capability and assets, impede business operations, and target physical assets and mission critical information. With this emerging sophistication, current Intrusion Detection Systems (IDS) are also constantly evolving. As new viruses have emerged, the technologies used to detect them have also become more complex relying on sophisticated heuristics. Hosts and networks are constantly evolving with both security upgrades and topology changes. In addition, at most critical points of vulnerability, there are often vigilant humans in the loop.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D.H. Wolpert, The lack of a priori distinctions between learning algorithms. Neural Comput 8(7), 1341–1390 (1996)CrossRef D.H. Wolpert, The lack of a priori distinctions between learning algorithms. Neural Comput 8(7), 1341–1390 (1996)CrossRef
2.
Zurück zum Zitat H Zhu. No free lunch for cross validation. Neural Comput. 8(7), 1421–1426 (1996) H Zhu. No free lunch for cross validation. Neural Comput. 8(7), 1421–1426 (1996)
3.
Zurück zum Zitat K. Mehrotra, C. Mohan, S. Ranka, Elements of Artificial Neural Networks (The MIT Press, Cambridge, 2000) K. Mehrotra, C. Mohan, S. Ranka, Elements of Artificial Neural Networks (The MIT Press, Cambridge, 2000)
4.
Zurück zum Zitat E. Baum, F. Wilczek. Supervised learning of probability distributions by neural networks. Neural Inf. Proces. Syst. 1 52–61 (1988) E. Baum, F. Wilczek. Supervised learning of probability distributions by neural networks. Neural Inf. Proces. Syst. 1 52–61 (1988)
5.
Zurück zum Zitat G. Scott. Knowledge-based artificial neural networks for process modeling and control (The University of Wisconsin, Madison, 1993) G. Scott. Knowledge-based artificial neural networks for process modeling and control (The University of Wisconsin, Madison, 1993)
7.
Zurück zum Zitat J. Woodward, Computable and incomputable functions and search algorithms. Intell. Comput. Intell. Syst. 1, 871–875 (2009) J. Woodward, Computable and incomputable functions and search algorithms. Intell. Comput. Intell. Syst. 1, 871–875 (2009)
9.
Zurück zum Zitat H. Barlow. Possible principles underlying the transformations of sensory messages. ed. by W. Rosenblith. Sensory Communication (MIT Press, Cambridge, 1961) H. Barlow. Possible principles underlying the transformations of sensory messages. ed. by W. Rosenblith. Sensory Communication (MIT Press, Cambridge, 1961)
10.
Zurück zum Zitat Z. Li, J. Yuan, H. Yang, K. Khang. K-mean Algorithm with a distance based on characteristics of differences, in 4th International Conference on Wireless Communications, Networking and Mobile Computing, Oct 2008, pp. 1–4 Z. Li, J. Yuan, H. Yang, K. Khang. K-mean Algorithm with a distance based on characteristics of differences, in 4th International Conference on Wireless Communications, Networking and Mobile Computing, Oct 2008, pp. 1–4
11.
Zurück zum Zitat J. Han, M. Kamber, Data Mining: Concepts and Techniques (Academic Press, San Diego, 2001) J. Han, M. Kamber, Data Mining: Concepts and Techniques (Academic Press, San Diego, 2001)
12.
Zurück zum Zitat R. Duda, P. Hart, D. Stork, Pattern Classification (John Wiley & Sons, New York, 2001)MATH R. Duda, P. Hart, D. Stork, Pattern Classification (John Wiley & Sons, New York, 2001)MATH
13.
Zurück zum Zitat T. Pang-Ning, M. Steinbach, V. Kumar. Introduction to Data Mining (Addison-Wesley, Boston, 2005) T. Pang-Ning, M. Steinbach, V. Kumar. Introduction to Data Mining (Addison-Wesley, Boston, 2005)
14.
Zurück zum Zitat J. Yu, J. Amores, N. Sebe, P. Radeva, Q. Tian, Distance learning for similarity estimation. IEEE Trans. Pattern Anal. Mach. Intell. 30(3), 451–462 (2008)CrossRef J. Yu, J. Amores, N. Sebe, P. Radeva, Q. Tian, Distance learning for similarity estimation. IEEE Trans. Pattern Anal. Mach. Intell. 30(3), 451–462 (2008)CrossRef
15.
Zurück zum Zitat C. Domeniconi, J. Peng, D. Gunopulos, Locally adaptive metric nearest neighbor classification. IEEE Trans. Pattern. Anal. Mach. Intell. 24(9), 1281–1285 (2002)CrossRef C. Domeniconi, J. Peng, D. Gunopulos, Locally adaptive metric nearest neighbor classification. IEEE Trans. Pattern. Anal. Mach. Intell. 24(9), 1281–1285 (2002)CrossRef
16.
Zurück zum Zitat E. Xing, A. Ng, M. Jordan, S. Russell. Distance metric learning, with application to clustering with side-information. in Proceedings of Neural Information Processing Systems, 2003, pp. 505–512 E. Xing, A. Ng, M. Jordan, S. Russell. Distance metric learning, with application to clustering with side-information. in Proceedings of Neural Information Processing Systems, 2003, pp. 505–512
18.
Zurück zum Zitat G. Myatt. Making Sense of Data: A Practical Guide to Exploratory Data Analysis and Data Mining (John Wiley & Sons, New York, 2007 G. Myatt. Making Sense of Data: A Practical Guide to Exploratory Data Analysis and Data Mining (John Wiley & Sons, New York, 2007
19.
Zurück zum Zitat L. Heyer et al. Exploring expression data: identification and analysis of coexpressed genes. Genome Res. 9, 1106–1115 (1999) L. Heyer et al. Exploring expression data: identification and analysis of coexpressed genes. Genome Res. 9, 1106–1115 (1999)
20.
Zurück zum Zitat L. Zadeh. Fuzzy sets. Inf. Control 8, 338–353 (1965). As sited by Martin L. Zadeh. Fuzzy sets. Inf. Control 8, 338–353 (1965). As sited by Martin
21.
Zurück zum Zitat M. Ester, H.-P. Kriegel, J. Sander, X. Xu. A density-based algorithm for discovering clusters in large spatial databases with noise, in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), ed. by E. Simoudis, J. Han, U.M. Fayyad. AAAI Press, pp. 226–231. ISBN 1-57735-004-9 M. Ester, H.-P. Kriegel, J. Sander, X. Xu. A density-based algorithm for discovering clusters in large spatial databases with noise, in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), ed. by E. Simoudis, J. Han, U.M. Fayyad. AAAI Press, pp. 226–231. ISBN 1-57735-004-9
23.
Zurück zum Zitat H. Gunes Kayacik, A.N. Zincir-Heywood, M.I. Heywood, S. Burschka. Generating mimicry attacks using genetic programming: a benchmarking study, in IEEE Symposium on Computational Intelligence in Cyber Security, 2009 H. Gunes Kayacik, A.N. Zincir-Heywood, M.I. Heywood, S. Burschka. Generating mimicry attacks using genetic programming: a benchmarking study, in IEEE Symposium on Computational Intelligence in Cyber Security, 2009
24.
Zurück zum Zitat M. Blowers. Analysis of Machine Learning Models and Prediction Tools for Paper Machine Systems. Dissertation, State University of New York College of Environmental Science and Forestry, 2010 M. Blowers. Analysis of Machine Learning Models and Prediction Tools for Paper Machine Systems. Dissertation, State University of New York College of Environmental Science and Forestry, 2010
26.
Zurück zum Zitat W. Stitieler, Multivariate Statistics with Applications in Statistical Ecology (International Co-operative Publishing House, Fairland, 1979) W. Stitieler, Multivariate Statistics with Applications in Statistical Ecology (International Co-operative Publishing House, Fairland, 1979)
27.
Zurück zum Zitat J. Han, M. Kamber. Data Mining Concepts and Techniques, 2nd edn (Morgan Kaufmann, San Francisco, 2006). ISBN 1-55860-9016 J. Han, M. Kamber. Data Mining Concepts and Techniques, 2nd edn (Morgan Kaufmann, San Francisco, 2006). ISBN 1-55860-9016
28.
Zurück zum Zitat M. Blowers, C. Salisbury. Method and apparatus for event detection permitting per event adjustment of false alarm rate. United States Patent Application 20120271782 M. Blowers, C. Salisbury. Method and apparatus for event detection permitting per event adjustment of false alarm rate. United States Patent Application 20120271782
29.
Zurück zum Zitat G.A. Fink, C. S. Oehmen. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. No. PNNL-21854. Pacific Northwest National Laboratory (PNNL), Richland, WA , 2012 G.A. Fink, C. S. Oehmen. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. No. PNNL-21854. Pacific Northwest National Laboratory (PNNL), Richland, WA , 2012
33.
Zurück zum Zitat R.M. Chandrasekaran, M. Govindarajan. Bagged genetic algorithm for network intrusion detection. Int. J. Res. Rev. Inf. Secur. Priv. 1(2), 33+ (2011) R.M. Chandrasekaran, M. Govindarajan. Bagged genetic algorithm for network intrusion detection. Int. J. Res. Rev. Inf. Secur. Priv. 1(2), 33+ (2011)
34.
Zurück zum Zitat S. Akbar, K. Nageswara Rao, J.A. Chandulal. Implementing rule based genetic algorithm as a solution for intrusion detection system. Int. J. Comput. Sci. Netw. Secur. 11(8), 138 (2011) S. Akbar, K. Nageswara Rao, J.A. Chandulal. Implementing rule based genetic algorithm as a solution for intrusion detection system. Int. J. Comput. Sci. Netw. Secur. 11(8), 138 (2011)
35.
Zurück zum Zitat W. Li. Using genetic algorithm for network intrusion detection, in Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas City, Kansas, 2004, pp. 24–27 W. Li. Using genetic algorithm for network intrusion detection, in Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas City, Kansas, 2004, pp. 24–27
36.
Zurück zum Zitat A. Goyal, C. Kumar. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System. not published. Electrical Engineering and Computer Science, Northwestern University, Evanston, IL (2007) A. Goyal, C. Kumar. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System. not published. Electrical Engineering and Computer Science, Northwestern University, Evanston, IL (2007)
37.
Zurück zum Zitat A.C. Divya. GHIDS: a hybrid honeypot system using genetic algorithm. Int. J. Comput. Technol. Appl. 3, 187 (2012) A.C. Divya. GHIDS: a hybrid honeypot system using genetic algorithm. Int. J. Comput. Technol. Appl. 3, 187 (2012)
38.
Zurück zum Zitat J.M. Smith. Evolution and the Theory of Games Springer US, 1993, pp. 202-215 J.M. Smith. Evolution and the Theory of Games Springer US, 1993, pp. 202-215
39.
Zurück zum Zitat W. Li. Using genetic algorithm for network intrusion detection, in Proceedings of the United States Department of Energy Cyber Security Group, 2004 W. Li. Using genetic algorithm for network intrusion detection, in Proceedings of the United States Department of Energy Cyber Security Group, 2004
40.
Zurück zum Zitat S.M. Bridges, R.B. Vaughn. Fuzzy data mining and genetic algorithms applied to intrusion Detection, in Proceedings of 12th Annual Canadian Information Technology Security Symposium, 2000, pp. 109–122 S.M. Bridges, R.B. Vaughn. Fuzzy data mining and genetic algorithms applied to intrusion Detection, in Proceedings of 12th Annual Canadian Information Technology Security Symposium, 2000, pp. 109–122
Metadaten
Titel
Machine Learning Applied to Cyber Operations
verfasst von
Misty Blowers
Jonathan Williams
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7597-2_10