Machine Learning and Data Mining for IPv6 Network Defence

被引:0
|
作者
Weisman, Michael [1 ]
Ritchey, P. [1 ]
Shearer, G. [1 ]
Colbert, E. [1 ]
Dauber, E. [2 ]
Knachel, L. [1 ]
Sullivan, D. [1 ]
Parker, T. [1 ]
Greenstadt, R. [2 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
[2] Drexel Univ, Philadelphia, PA 19104 USA
来源
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018) | 2018年
关键词
data mining; machine learning; IPv6; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In future battles, the warfighter will of necessity require more and more networked devices to perform a broad range of tasks. It has been predicted that by the year 2020, there will be 20 billion Internet-of-Things (IoT) devices (and more than 6.2 billion today) (N. Dragoni, 2017). IPv4 addresses are 32 bit and IPv6 addresses are 128 bit. All of the 232 approximate to 4.3 billion IPv4 addresses have already been exhausted, and except for the possible transfer from one device to another, and with the end-to-end design paradigm of IPv6, all new IoT devices will need an IPv6 address. Because of the huge number of potential IPv6 addresses (2128 approximate to 3.4 x1038), probing every address is not possible. The only way determine IPv6 addresses is by watching traffic. In this paper, we will apply data mining and machine learning techniques to better understand the challenges of IPv6 security. We perform semi-supervised learning techniques such as augmenting k-means clustering with sparse labels to understand the distribution of IPv4 addresses, and explore whether or not clustering of IPv6 addresses is possible. We also will measure the performance of IPv4 anomaly detection algorithms and look to apply these algorithms with modifications to IPv6 data. Finally, we explore domain adaptation and transfer learning from IPv4 to IPv6 and ask how easily can we adapt a system trained for IPv4 to IPv6 and what changes do we need to make? If we include additional IPv6 training data, how do things change?
引用
收藏
页码:681 / 688
页数:8
相关论文
共 50 条
  • [31] Data Mining and Analytics in the Process Industry: The Role of Machine Learning
    Ge, Zhiqiang
    Song, Zhihuan
    Deng, Steven X.
    Huang, Biao
    IEEE ACCESS, 2017, 5 : 20590 - 20616
  • [32] Knowledge Discovery: Methods from data mining and machine learning
    Shu, Xiaoling
    Ye, Yiwan
    SOCIAL SCIENCE RESEARCH, 2023, 110
  • [33] Crawler intelligence with Machine Learning and Data Mining integration.
    Darshakar, Abhiraj
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [34] A Method For Fetal Assessment Using Data Mining and Machine Learning
    Copeland, Wes
    Chiang, Chia-Chu
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 341 - 344
  • [35] A Survey of Internet Data Mining Technologies Based on Machine Learning
    Du, Lin
    Han, Yehong
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 1623 - 1626
  • [36] Reintroducing KAPD as a Dataset for Machine Learning and Data Mining Applications
    Seddiq, Yasser
    Meftah, Ali
    Alghamdi, Mansour
    Alotaibi, Yousef
    UKSIM-AMSS 10TH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS), 2016, : 70 - 74
  • [37] Data mining and machine learning in the context of disaster and crisis management
    Zagorecki, Adam T.
    Johnson, David E. A.
    Ristvej, Jozef
    INTERNATIONAL JOURNAL OF EMERGENCY MANAGEMENT, 2013, 9 (04) : 351 - 365
  • [38] Fuzzy methods in machine learning and data mining: Status and prospects
    Hüllermeier, E
    FUZZY SETS AND SYSTEMS, 2005, 156 (03) : 387 - 406
  • [39] Outlier data mining model for sports data analysis based on machine learning
    Yin, Zhimeng
    Cui, Wei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (02) : 2733 - 2742
  • [40] Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives
    Poudyal, Subash
    Akhtar, Zahid
    Dasgupta, Dipankar
    Gupta, Kishor Datta
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 649 - 656