Skip to main content

Review of Machine Learning and Data Mining Methods to Predict Different Cyberattacks

  • Conference paper
  • First Online:
Data Science and Intelligent Applications

Abstract

Cybersecurity deals with various types of cybercrimes, but it is essential to identify the similarities in existing cybercrimes using data mining and machine learning technologies. This review paper reveals various data mining algorithms and machine learning algorithms, which can be help to create some specific schema of different cyberattacks. Machine learning algorithms can be helpful to train system to identify anomaly, specific patterns to predict the cyberattacks. Data mining plays a critical role to provide a predictive solution to rectify possible cybercrime and modus operandi and explore defense system against them. This is the era of big data, so it is very difficult to analyze and investigate the irregular activity on cyberspace. Data mining methods, while allowing the system to analyze hidden knowledge and to train expert system to alert and decision-making process. This review paper explores various data mining method like classification, association, and Clustering, while machine learning includes different methods like supervised, semi-supervised, and unsupervised learning methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fischer EA (2014) Cybersecurity issues and challenges: in brief

    Google Scholar 

  2. Han J, Kamber M, Pei J (2012) Data mining concepts and techniques. In: Han J (ed) Introduction, 3rd edn. Elsevier, USA

    Google Scholar 

  3. John S, Sara G, Gillian M (2013) Comprehensive study on cybercrime. In: John S (ed) Connectitivity and cybercrime, 1st edn. United Nations Office on Drugs and Crime, Vienna, USA

    Google Scholar 

  4. Artur A (2014) Legal aspects of cybersecurity. In: Artur A (ed) Cybersecurity as an umbrella concept, 1st edn. University of Copenhagen, Denmark

    Google Scholar 

  5. Azene Z, Mufaro S, Andrei C et al (2019) Cyber threat discovery from dark web. EPIC Ser Com 64:174–183

    Article  Google Scholar 

  6. Benjamin V, Li W, Holt T et al (2015) Exploring threats and vulnerabilities in hacker web: forums, IRC and carding shops. Paper presented at USA, University of Maryland, Baltimore County

    Google Scholar 

  7. Mavroeidis V, Bromander S (2017) Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. Paper presented at Greece, pp 11–13

    Google Scholar 

  8. Nunes E, Diab A, Gunn A (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence paper presented at USA, pp 28–30

    Google Scholar 

  9. Anshu S, Shilpa S (2008) An intelligent analysis of web crime data using data mining. Int J Eng Innovative Technol 2(3)

    Google Scholar 

  10. Hsinchun C, Wingyan C, Yi Q (2003) Crime data mining: an overview and case studies. In: Paper presented at proceeding of the annual national conference on digital government research, Boston, MA

    Google Scholar 

  11. Abraham T, De Vel O (2006) Investigating profiling with computer forensic log data and association rules. In: Paper presented at proceedings of the IEEE international Conference on data mining

    Google Scholar 

  12. Lin HF, Liang JM (2005) Liang event based ontology design for retrieving digital archieves on human religious self-help consulting. In: Paper presented at proceedings of IEEE international conference on e-technology, e-commerce and e-service

    Google Scholar 

  13. Zarri GP (2002) Semantic web and knowledge representation. In: Paper presented at proceedings of the 13th international workshop on database and expert system applications

    Google Scholar 

  14. Malathi A, Babboo SS, Nbarasi A (2011) An intelligent analysis of a city crime data using data mining. In: International conference information electronic engineering, pp 130–134

    Google Scholar 

  15. Veena HB, Prasanth GR, Deepa PS (2011) Data mining approach for data generation and analysis for digital forensic application. Int J Web Eng Tech 2(3): 313–319. https://doi.org/10.7763/ijet.2010.V2.140

  16. Robert R (2004) A ten step approach for forensic readiness. Int J Dig Evi 2(3):313–319

    Google Scholar 

  17. Kara N, Brian H, Matt B (2009) Digital forensics: defining a research agenda. In: Paper presented at proceedings of the forty second Hawaii international conference on system sciences

    Google Scholar 

  18. Pollitt M (1995) Computer forensics: an approach to evidence in cyberspace. In: Paper presented at proceedings of the national information systems security conference, USA

    Google Scholar 

  19. Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. Int J Dig Evi 1(3):01–12

    Google Scholar 

  20. Kohn M, Eloff J, Oliver M (2006) Framework for a digital forensic investigation. In: Paper presented at proceedings of information security from insight to foresight conference, South Africa

    Google Scholar 

  21. Freiling FC, Schwittay B (2007) A common process model for incident response and computer forensics. In: Paper presented at proceedings of conference on incident management and IT forensics, Germany

    Google Scholar 

  22. Brian C, Eugene H (2003) Spafford: getting physical with digital investigation process. Int J Dig Evi 3(2):1–20

    Google Scholar 

  23. Siti RS, Robiah Y, Shahrin S (2006) Mapping process of digital forensic investigation framework. Int J Comput Sci Netw Secur 8(10):163–169

    Google Scholar 

  24. Azah AN, Suraya H, Maw MH, Suraya IT (2017) Security threats and techniques in social networking sites: a systematic literature review. In: Paper presented at future technologies conference, Vancouver, Canada, pp 29–30

    Google Scholar 

  25. Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput mediated commun 13(1):210–230

    Article  MathSciNet  Google Scholar 

  26. Hydara I, Sultan ABM, Zulzalil H, Admodisastro N (2015) Current state of research on cross-site scripting (XSS): a systematic literature review. Inf Sof Tec 58:170–186

    Google Scholar 

  27. Devmane M, Rana N (2013) Security issues of online social networks. Adv Comput Commun Control 14:740–746

    Google Scholar 

  28. Faghani MR, Matrawy A, Lung CH (2012) A study of trojan propagation in online social networks. In: Paper presented at the international conference on new technologies, mobility and security, IEEE

    Google Scholar 

  29. Ahmed F, Abulaish M (2013) A generic statistical approach for spam detection in online social networks. Comput Commun 36(10–11):1120–1129

    Google Scholar 

  30. Lee S, Kim J (2014) Early filtering of ephemeral malicious accounts on twitter. Comput Commun 54:48–57

    Article  Google Scholar 

  31. Soumajyoti S, Mohammad A, Jana S (2018) Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. Cornell University. Available via DIALOG. https://arxiv.org/abs/1811.06537

  32. Almukaynizi M (2017) Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums. ACM Comput Soc Sci 01:1–9

    Google Scholar 

  33. Leo B (2001) Random forests machine learning. available vai DIALOG. https://www.stat.berkeley.edu/~breiman/randomforest2001.pdftitel

  34. Anna S, Alessandro B, Saranya D, Paulo S (2017) Early warnings of cyber threats in online discussions. Cornell University. Available via DIALOG https://arxiv.org/abs/1801.09781

  35. Herley C, Dinei F (2010) Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy of information security and privacy. Springer 01:33–53

    Google Scholar 

  36. Meier L, Van De Geer S, Bühlmann P (2008) The group lasso for logistic regression. J R Stat Soc: Ser B (Stat Methodol) 70(1):53–71

    Google Scholar 

  37. Allodi L, Corradin M, Massacci F (2016) Then and now: on the maturity of the cybercrime markets the lesson that blackhat marketeers learned. IEEE Trans Emerg Top Comput 4(1):35–46

    Google Scholar 

  38. Palash G, Tozammel HKSM, Ashok D, Nazgol T (2018) Discovering signals from web sources to predict cyber-attacks. IEEE Sys 10(10):1–11

    Google Scholar 

  39. Eric N (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: Paper presented at IEEE conference on intelligence and security informatics, Tucson, AZ, USA, pp 28–30

    Google Scholar 

  40. Adgaonkar A, Shaikh H (2015) Privacy in online social networks. Int J Adv Res Com Sci Sof Engg 05(03):01–09

    Google Scholar 

  41. Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Trans 14:447–460

    Google Scholar 

  42. Vishwanath A (2017) Getting phished on social media. Decis Support Syst 103:70–81

    Article  Google Scholar 

  43. Ali S, Rauf A, Islam N, Farman H (2017) User profiling: a privacy issue in online public network. Sindh Univ Res J (Sci Seri) 49:125–128

    Google Scholar 

  44. Global journal of computer science and technology: C software & data engineering. Online ISSN: 0975-4172

    Google Scholar 

  45. Sapienza A (2017) Early warnings of cyber threats in online discussions. In: Data mining workshops (ICDMW)

    Google Scholar 

  46. Adgaonkar A, Shaikh H (2015) Privacy in online social networks. Int J Adv Res Comput Sci Softw Eng 5(3)

    Google Scholar 

  47. Nunes E (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: IEEE ISI

    Google Scholar 

  48. Norman AA, Hamid S, Hanifa MM, Tamrin SI (2017) Security threats and techniques in social networking sites: a systematic literature review. In: Future technologies conference, Vancouver, Canada, pp 29–30

    Google Scholar 

  49. Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Trans Dependable Secure Comput 14:447–460

    Article  Google Scholar 

  50. Sharma A, Sharma S (2012) An intelligent analysis of web crime data using data Mining. Certif Int J Eng Innov Technol 2(3). ISSN: 2277-3754 ISO 9001:2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Narendrakumar Mangilal Chayal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chayal, N.M., Patel, N.P. (2021). Review of Machine Learning and Data Mining Methods to Predict Different Cyberattacks. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_5

Download citation

Publish with us

Policies and ethics