Abstract
Cybersecurity deals with various types of cybercrimes, but it is essential to identify the similarities in existing cybercrimes using data mining and machine learning technologies. This review paper reveals various data mining algorithms and machine learning algorithms, which can be help to create some specific schema of different cyberattacks. Machine learning algorithms can be helpful to train system to identify anomaly, specific patterns to predict the cyberattacks. Data mining plays a critical role to provide a predictive solution to rectify possible cybercrime and modus operandi and explore defense system against them. This is the era of big data, so it is very difficult to analyze and investigate the irregular activity on cyberspace. Data mining methods, while allowing the system to analyze hidden knowledge and to train expert system to alert and decision-making process. This review paper explores various data mining method like classification, association, and Clustering, while machine learning includes different methods like supervised, semi-supervised, and unsupervised learning methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fischer EA (2014) Cybersecurity issues and challenges: in brief
Han J, Kamber M, Pei J (2012) Data mining concepts and techniques. In: Han J (ed) Introduction, 3rd edn. Elsevier, USA
John S, Sara G, Gillian M (2013) Comprehensive study on cybercrime. In: John S (ed) Connectitivity and cybercrime, 1st edn. United Nations Office on Drugs and Crime, Vienna, USA
Artur A (2014) Legal aspects of cybersecurity. In: Artur A (ed) Cybersecurity as an umbrella concept, 1st edn. University of Copenhagen, Denmark
Azene Z, Mufaro S, Andrei C et al (2019) Cyber threat discovery from dark web. EPIC Ser Com 64:174–183
Benjamin V, Li W, Holt T et al (2015) Exploring threats and vulnerabilities in hacker web: forums, IRC and carding shops. Paper presented at USA, University of Maryland, Baltimore County
Mavroeidis V, Bromander S (2017) Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. Paper presented at Greece, pp 11–13
Nunes E, Diab A, Gunn A (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence paper presented at USA, pp 28–30
Anshu S, Shilpa S (2008) An intelligent analysis of web crime data using data mining. Int J Eng Innovative Technol 2(3)
Hsinchun C, Wingyan C, Yi Q (2003) Crime data mining: an overview and case studies. In: Paper presented at proceeding of the annual national conference on digital government research, Boston, MA
Abraham T, De Vel O (2006) Investigating profiling with computer forensic log data and association rules. In: Paper presented at proceedings of the IEEE international Conference on data mining
Lin HF, Liang JM (2005) Liang event based ontology design for retrieving digital archieves on human religious self-help consulting. In: Paper presented at proceedings of IEEE international conference on e-technology, e-commerce and e-service
Zarri GP (2002) Semantic web and knowledge representation. In: Paper presented at proceedings of the 13th international workshop on database and expert system applications
Malathi A, Babboo SS, Nbarasi A (2011) An intelligent analysis of a city crime data using data mining. In: International conference information electronic engineering, pp 130–134
Veena HB, Prasanth GR, Deepa PS (2011) Data mining approach for data generation and analysis for digital forensic application. Int J Web Eng Tech 2(3): 313–319. https://doi.org/10.7763/ijet.2010.V2.140
Robert R (2004) A ten step approach for forensic readiness. Int J Dig Evi 2(3):313–319
Kara N, Brian H, Matt B (2009) Digital forensics: defining a research agenda. In: Paper presented at proceedings of the forty second Hawaii international conference on system sciences
Pollitt M (1995) Computer forensics: an approach to evidence in cyberspace. In: Paper presented at proceedings of the national information systems security conference, USA
Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. Int J Dig Evi 1(3):01–12
Kohn M, Eloff J, Oliver M (2006) Framework for a digital forensic investigation. In: Paper presented at proceedings of information security from insight to foresight conference, South Africa
Freiling FC, Schwittay B (2007) A common process model for incident response and computer forensics. In: Paper presented at proceedings of conference on incident management and IT forensics, Germany
Brian C, Eugene H (2003) Spafford: getting physical with digital investigation process. Int J Dig Evi 3(2):1–20
Siti RS, Robiah Y, Shahrin S (2006) Mapping process of digital forensic investigation framework. Int J Comput Sci Netw Secur 8(10):163–169
Azah AN, Suraya H, Maw MH, Suraya IT (2017) Security threats and techniques in social networking sites: a systematic literature review. In: Paper presented at future technologies conference, Vancouver, Canada, pp 29–30
Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput mediated commun 13(1):210–230
Hydara I, Sultan ABM, Zulzalil H, Admodisastro N (2015) Current state of research on cross-site scripting (XSS): a systematic literature review. Inf Sof Tec 58:170–186
Devmane M, Rana N (2013) Security issues of online social networks. Adv Comput Commun Control 14:740–746
Faghani MR, Matrawy A, Lung CH (2012) A study of trojan propagation in online social networks. In: Paper presented at the international conference on new technologies, mobility and security, IEEE
Ahmed F, Abulaish M (2013) A generic statistical approach for spam detection in online social networks. Comput Commun 36(10–11):1120–1129
Lee S, Kim J (2014) Early filtering of ephemeral malicious accounts on twitter. Comput Commun 54:48–57
Soumajyoti S, Mohammad A, Jana S (2018) Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. Cornell University. Available via DIALOG. https://arxiv.org/abs/1811.06537
Almukaynizi M (2017) Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums. ACM Comput Soc Sci 01:1–9
Leo B (2001) Random forests machine learning. available vai DIALOG. https://www.stat.berkeley.edu/~breiman/randomforest2001.pdftitel
Anna S, Alessandro B, Saranya D, Paulo S (2017) Early warnings of cyber threats in online discussions. Cornell University. Available via DIALOG https://arxiv.org/abs/1801.09781
Herley C, Dinei F (2010) Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy of information security and privacy. Springer 01:33–53
Meier L, Van De Geer S, Bühlmann P (2008) The group lasso for logistic regression. J R Stat Soc: Ser B (Stat Methodol) 70(1):53–71
Allodi L, Corradin M, Massacci F (2016) Then and now: on the maturity of the cybercrime markets the lesson that blackhat marketeers learned. IEEE Trans Emerg Top Comput 4(1):35–46
Palash G, Tozammel HKSM, Ashok D, Nazgol T (2018) Discovering signals from web sources to predict cyber-attacks. IEEE Sys 10(10):1–11
Eric N (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: Paper presented at IEEE conference on intelligence and security informatics, Tucson, AZ, USA, pp 28–30
Adgaonkar A, Shaikh H (2015) Privacy in online social networks. Int J Adv Res Com Sci Sof Engg 05(03):01–09
Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Trans 14:447–460
Vishwanath A (2017) Getting phished on social media. Decis Support Syst 103:70–81
Ali S, Rauf A, Islam N, Farman H (2017) User profiling: a privacy issue in online public network. Sindh Univ Res J (Sci Seri) 49:125–128
Global journal of computer science and technology: C software & data engineering. Online ISSN: 0975-4172
Sapienza A (2017) Early warnings of cyber threats in online discussions. In: Data mining workshops (ICDMW)
Adgaonkar A, Shaikh H (2015) Privacy in online social networks. Int J Adv Res Comput Sci Softw Eng 5(3)
Nunes E (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: IEEE ISI
Norman AA, Hamid S, Hanifa MM, Tamrin SI (2017) Security threats and techniques in social networking sites: a systematic literature review. In: Future technologies conference, Vancouver, Canada, pp 29–30
Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Trans Dependable Secure Comput 14:447–460
Sharma A, Sharma S (2012) An intelligent analysis of web crime data using data Mining. Certif Int J Eng Innov Technol 2(3). ISSN: 2277-3754 ISO 9001:2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chayal, N.M., Patel, N.P. (2021). Review of Machine Learning and Data Mining Methods to Predict Different Cyberattacks. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_5
Download citation
DOI: https://doi.org/10.1007/978-981-15-4474-3_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4473-6
Online ISBN: 978-981-15-4474-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)