Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance

被引:45
作者
Arivudainambi, D. [1 ]
Kumar, Varun K. A. [1 ]
Chakkaravarthy, Sibi S. [2 ]
Visu, P. [3 ]
机构
[1] Anna Univ, Dept Math, Madras, Tamil Nadu, India
[2] VIT AP, Dept Comp Sci & Engn, Amaravati, Andhra Pradesh, India
[3] Velammal Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
AI driven cyber-attacks; Malwares; Principle component analysis; Surveillance; Artificial neural network; INTRUSION DETECTION;
D O I
10.1016/j.comcom.2019.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code-driven systems have extent to more than half of the world's populations in ambient data and connectivity, offering formerly unimagined opportunities and unexpected threats. Evolutions in Artificial Intelligence (AI) are seen increasing day by day especially in industrial builds. The unconventional technique of AI in cyber-attacks seems to be quite daunting. The idea of a machine growing its own knowledge through self-learning becomes sophisticated to attack things is a fretful problem to the cyber world. Most of the time, these AI enabled cyber-attacks are performed using advanced malwares which incorporates advanced evasion techniques to evade security perimeters. Traditional cyber security methods fail to cope with these attacks. In order to address these issues, robust traffic classification system using Principal Component Analysis (PCA) and Artificial Neural Network (ANN) is proposed for providing extreme surveillance. Further, these proposed method aims to expose various AI based cyber-attacks with their present-day impact, and their fortune in the future. Simulation is carried out using a self-developed autonomous agent which learns by itself. Experimental results confirm that the proposed schemes are efficient to classify the attack traffic with 99% of accuracy when compared to the state of the art methods.
引用
收藏
页码:50 / 57
页数:8
相关论文
共 23 条
  • [1] Alahmadi B. A., 2018, P APWG S EL CRIM RES, P1
  • [2] [Anonymous], NEURAL COMPUTING APP
  • [3] [Anonymous], 1997, Intelligent Agents III Agent Theories, Architectures, and Languages, DOI [DOI 10.1007/BFB0013570, 10.1007/BFb0013570]
  • [4] On some artificial intelligence methods and technologies for cloud-computing protection
    A. A. Grusho
    M. I. Zabezhailo
    A. A. Zatsarinnyi
    V. O. Piskovskii
    [J]. Automatic Documentation and Mathematical Linguistics, 2017, 51 (2) : 62 - 74
  • [5] Guariti G., 2013, 2013 IEEE MTTS Int. Microw. Symp. Digest, P1
  • [6] Herrero A, 2007, ADV SOFT COMP, V44, P320
  • [7] Hsu CH, 2010, LECT NOTES COMPUT SC, V6307, P464, DOI 10.1007/978-3-642-15512-3_24
  • [8] Kotenko I, 2010, CONFERENCE ON CYBER CONFLICT, PROCEEDINGS 2010, P21
  • [9] Towards a Network-Based Framework for Android Malware Detection and Characterization
    Lashkari, Arash Habibi
    Kadir, Andi Fitriah A.
    Gonzalez, Hugo
    Mbah, Kenneth Fon
    Ghorbani, Ali A.
    [J]. 2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 233 - 242
  • [10] Distributed Finite-Time Cooperative Control for Quadrotor Formation
    Li, Yue
    Yang, Jun
    Zhang, Ke
    [J]. IEEE ACCESS, 2019, 7 : 66753 - 66763