SlideShare a Scribd company logo
Role of Data Mining in
Cyber Security
Prepared by:
Ahmad Al-Yassin
Muhammad Khaled Al-Khalili
Muhammad Nashouq
Outline
What is Cyber Security?
What is Cyber Crime?
Applications of Data Mining in Cyber Security.
Intrusion detection.
Why Can Data Mining Help?
Data Mining approaches for Intrusion Detection.
Conclusion.
Cyber Security
Set of technologies and processes designed to protect computers,
networks, programs, and data from attack, unauthorized access, change,
or destruction.
A Major part of Cyber Security
is to fix broken Software.
Cyber
Security
Computer
Security System
Network
Security System
Cyber Crime
Encompasses any criminal act dealing with computers and networks.
Include:
• Malicious programs.
• Illegal imports.
• Computers Vandalism.
Cyber Security VS Cyber Crime
Cyber
SecurityCyber Crime Cyber Security
Cyber
Crime
One side of the
coin
Other side of the
coin
Cyber Attacks (Intrusions)
Actions that attempt to bypass security mechanisms of computer
systems.
Any set of actions that threaten the integrity, availability, or
confidentiality of a network resource.
Examples:
• Denial of service (DoS).
• Scan.
• Worms and viruses.
• Compromises.
Applications of Data Mining in Cyber Security
Malware detection.
Intrusion detection.
Fraud detection.
Intrusion Detection
The process of monitoring the events occurring in a computer system or
network and analyzing them for signs of intrusion.
Intrusion Detection System (IDS)
Combination of software and hardware that attempts to perform
intrusion detection.
Raise the alarm when possible intrusion happens.
Steps:
 Monitoring and analyzing traffic.
 Identifying abnormal activities.
 Assessing severity and raising alarm.
Information Source - Monitored System
Detector – ID Engine
Response
Component
Data gathering (sensors)
Raw data
Events
Knowledge base Configuration
Alarms
Actions
System State
System
State
Intrusion Detection System Architecture
IDS - Analysis Strategy
Misuse detection.
• Effective detecting known type of attacks by using signatures of those attacks
without generation false alarms.
• Cannot detect novel (Zero-day) attacks.
Anomaly detection.
• Identify the anomalies from normal behavior.
• Able to detect Zero-day attacks.
Hybrid detection.
• Combination of misuse and anomaly detection.
• Increase the detection rate and decrease the false alarm generation.
Goals of Intrusion Detection System (IDS)
Detect wide variety of intrusions.
Detect intrusions in timely fashion.
Present analysis in simple, easy-to-understand format.
Be accurate.
Why We Need Intrusion Detection?
Security mechanisms always have inevitable vulnerabilities.
Multiple levels of data confidentiality in commercial and government
organizations needs multi-layer protection in firewalls.
Traditional Intrusion Detection Systems
Traditional intrusion detection system (IDS) tools (e.g. SNORT) are
based on signatures of known attacks.
Limitations:
• Signature database has to be manually revised for each new type of
discovered intrusion.
• They cannot detect emerging cyber threats.
• Substantial latency in deployment of newly created signatures.
Data mining based IDSs can alleviate these limitations
Why Can Data Mining Help?
 Data mining: applying specific algorithms to extract patterns from
data.
 Normal and intrusive activities leave evidence in audit data.
 From the data-centric point view, intrusion detection is a data
analysis process.
Why Can Data Mining Help?
 Successful applications in related domains, e.g., fraud detection,
fault/alarm management.
 Learn from traffic data:
• Supervised learning: learn precise models from past intrusions.
• Unsupervised learning: identify suspicious activities.
 Maintain or update models on dynamic data.
Data Mining approaches for Intrusion Detection
Frequent Patterns
Patterns that occur frequently in a database.
Mining Frequent patterns – finding regularities.
Process of Mining Frequent patterns for intrusion detection.
• Phase I: mine a repository of normal frequent itemsets for attack-free data.
• Phase II: find frequent itemsets in the last n connections and compare the
patterns to the normal profile.
Traffic Mining
Firewall log file
Mining log file Using
Frequency
Filtering Rule
Generalization
Generic Rule
Identify Decaying &
Dominant Rule
Edit Firewall Rule
Firewall
Policy Rule
Frequent Pattern Mining in MINDS
MINDS: a IDS using data mining techniques
• University of Minnesota
Summarizing attacks using association rules:
• {Src IP=206.163.27.95, Dest Port=139, Bytes[150, 200]}

{ATTACK}
Associate rules
Used for link analysis
E.g.:
• If the number of failed login attempts (num_failed_login_attempts)
and the network service on the destination (service) are features, an
example of rule is:
• num_failed_login_attempts = 6, service = FTP

attack = DoS [1, 0.28 ]
Classification Methods
Neural networks.
Bayesian classification.
Support vector machines.
Intrusion Detection by NN and SVM
Neural Networks can be used for :
• Anomaly detection.
The approach consists of maintaining a database of a sequence of
system calls made by each program to the operating system, used
as the signature for the normal behavior. If online sequence of
system calls for a program differ from the sequence in the database
anomalous behavior is registered. If significant percentage of
sequences does not match then alarm for intrusion is raised.
• Misuse detection
Classification based on known intrusions.
Email Worm Detection Using Data Mining
Outgoing Emails
Training Data
Test Data
Classifier
Feature
Extraction
Machine
Learning
The model
Clean or Infected
Clustering
Group data into clusters
What is a good clustering intra-class similarity
• Depending on the similarity measure.
• The ability to discover some or all of the hidden patterns.
Clustering Approaches
• K-means
• Hierarchical Clustering
Clustering for Intrusion Detection
Anomaly detection.
Any significant deviations from the expected behavior are reported as
possible attacks.
Build clusters as models for normal activities.
Data Preprocessing
Extract the “connection” level features:
• Record connection attempts
• Watch how connection is terminated
Each record has:
• start time and duration
• participating hosts and ports (applications)
• statistics (e.g., # of bytes)
• flag: normal or a connection/termination error
• protocol: TCP or UDP
Divide connections into 3 types: incoming, out-going, and inter-lan
commentsTypical time complexityAlgorithm
e: number of epochs
k: number of neurons
O(emnk)ANN
O(𝑛3)Accusation Rules
O(mn)Bayesian Network
i: number of iterations
until threshold is reached
k: number of clusters
O(kmni)Clustering K-mean
O(mn)Naïve Bayes
O(𝑛2)SVM
Complexity of Algorithms During Training
Conclusion
Data mining has great potential as a malware detection tool. It allows
you to analyze huge sets of information and extract new knowledge from
it.
The main benefit of using data mining techniques for detecting
malicious software is the ability to identify both known and zero-day
attacks. However, since a previously unknown but legitimate activity may
also be marked as potentially fraudulent, there’s the possibility for a high
rate of false positives.
Thankyou

More Related Content

What's hot

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
IRJET Journal
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
Deep Shankar Yadav
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
Cysinfo Cyber Security Community
 
The origin and evaluation criteria of aes
The origin and evaluation criteria of aesThe origin and evaluation criteria of aes
The origin and evaluation criteria of aes
MDKAWSARAHMEDSAGAR
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
State of the ATTACK
State of the ATTACKState of the ATTACK
State of the ATTACK
MITRE - ATT&CKcon
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
Danny Wong
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
Hossein Yavari
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 

What's hot (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
The origin and evaluation criteria of aes
The origin and evaluation criteria of aesThe origin and evaluation criteria of aes
The origin and evaluation criteria of aes
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
State of the ATTACK
State of the ATTACKState of the ATTACK
State of the ATTACK
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 

Similar to Role of data mining in cyber security

Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
Rineri1
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
Kishor Datta Gupta
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
csandit
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
Ids 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsIds 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systems
jyoti_lakhani
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 
DM for IDS
DM for IDSDM for IDS
DM for IDS
Nesma Mahmoud
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
pheonix4
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
pawandeoli1
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
jagadeesh katla
 
012
012012
Network and web security
Network and web securityNetwork and web security
Network and web security
Nitesh Saitwal
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
balbeerrawat
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
DNIF
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ClaraZara1
 

Similar to Role of data mining in cyber security (20)

Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Ids 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsIds 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systems
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
DM for IDS
DM for IDSDM for IDS
DM for IDS
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
012
012012
012
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Role of data mining in cyber security

  • 1. Role of Data Mining in Cyber Security Prepared by: Ahmad Al-Yassin Muhammad Khaled Al-Khalili Muhammad Nashouq
  • 2. Outline What is Cyber Security? What is Cyber Crime? Applications of Data Mining in Cyber Security. Intrusion detection. Why Can Data Mining Help? Data Mining approaches for Intrusion Detection. Conclusion.
  • 3. Cyber Security Set of technologies and processes designed to protect computers, networks, programs, and data from attack, unauthorized access, change, or destruction. A Major part of Cyber Security is to fix broken Software. Cyber Security Computer Security System Network Security System
  • 4. Cyber Crime Encompasses any criminal act dealing with computers and networks. Include: • Malicious programs. • Illegal imports. • Computers Vandalism.
  • 5. Cyber Security VS Cyber Crime Cyber SecurityCyber Crime Cyber Security Cyber Crime One side of the coin Other side of the coin
  • 6. Cyber Attacks (Intrusions) Actions that attempt to bypass security mechanisms of computer systems. Any set of actions that threaten the integrity, availability, or confidentiality of a network resource. Examples: • Denial of service (DoS). • Scan. • Worms and viruses. • Compromises.
  • 7. Applications of Data Mining in Cyber Security Malware detection. Intrusion detection. Fraud detection.
  • 8. Intrusion Detection The process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusion.
  • 9. Intrusion Detection System (IDS) Combination of software and hardware that attempts to perform intrusion detection. Raise the alarm when possible intrusion happens. Steps:  Monitoring and analyzing traffic.  Identifying abnormal activities.  Assessing severity and raising alarm.
  • 10. Information Source - Monitored System Detector – ID Engine Response Component Data gathering (sensors) Raw data Events Knowledge base Configuration Alarms Actions System State System State Intrusion Detection System Architecture
  • 11. IDS - Analysis Strategy Misuse detection. • Effective detecting known type of attacks by using signatures of those attacks without generation false alarms. • Cannot detect novel (Zero-day) attacks. Anomaly detection. • Identify the anomalies from normal behavior. • Able to detect Zero-day attacks. Hybrid detection. • Combination of misuse and anomaly detection. • Increase the detection rate and decrease the false alarm generation.
  • 12. Goals of Intrusion Detection System (IDS) Detect wide variety of intrusions. Detect intrusions in timely fashion. Present analysis in simple, easy-to-understand format. Be accurate.
  • 13. Why We Need Intrusion Detection? Security mechanisms always have inevitable vulnerabilities. Multiple levels of data confidentiality in commercial and government organizations needs multi-layer protection in firewalls.
  • 14. Traditional Intrusion Detection Systems Traditional intrusion detection system (IDS) tools (e.g. SNORT) are based on signatures of known attacks. Limitations: • Signature database has to be manually revised for each new type of discovered intrusion. • They cannot detect emerging cyber threats. • Substantial latency in deployment of newly created signatures. Data mining based IDSs can alleviate these limitations
  • 15. Why Can Data Mining Help?  Data mining: applying specific algorithms to extract patterns from data.  Normal and intrusive activities leave evidence in audit data.  From the data-centric point view, intrusion detection is a data analysis process.
  • 16. Why Can Data Mining Help?  Successful applications in related domains, e.g., fraud detection, fault/alarm management.  Learn from traffic data: • Supervised learning: learn precise models from past intrusions. • Unsupervised learning: identify suspicious activities.  Maintain or update models on dynamic data.
  • 17. Data Mining approaches for Intrusion Detection
  • 18. Frequent Patterns Patterns that occur frequently in a database. Mining Frequent patterns – finding regularities. Process of Mining Frequent patterns for intrusion detection. • Phase I: mine a repository of normal frequent itemsets for attack-free data. • Phase II: find frequent itemsets in the last n connections and compare the patterns to the normal profile.
  • 19. Traffic Mining Firewall log file Mining log file Using Frequency Filtering Rule Generalization Generic Rule Identify Decaying & Dominant Rule Edit Firewall Rule Firewall Policy Rule
  • 20. Frequent Pattern Mining in MINDS MINDS: a IDS using data mining techniques • University of Minnesota Summarizing attacks using association rules: • {Src IP=206.163.27.95, Dest Port=139, Bytes[150, 200]}  {ATTACK}
  • 21. Associate rules Used for link analysis E.g.: • If the number of failed login attempts (num_failed_login_attempts) and the network service on the destination (service) are features, an example of rule is: • num_failed_login_attempts = 6, service = FTP  attack = DoS [1, 0.28 ]
  • 22. Classification Methods Neural networks. Bayesian classification. Support vector machines.
  • 23. Intrusion Detection by NN and SVM Neural Networks can be used for : • Anomaly detection. The approach consists of maintaining a database of a sequence of system calls made by each program to the operating system, used as the signature for the normal behavior. If online sequence of system calls for a program differ from the sequence in the database anomalous behavior is registered. If significant percentage of sequences does not match then alarm for intrusion is raised. • Misuse detection Classification based on known intrusions.
  • 24. Email Worm Detection Using Data Mining Outgoing Emails Training Data Test Data Classifier Feature Extraction Machine Learning The model Clean or Infected
  • 25. Clustering Group data into clusters What is a good clustering intra-class similarity • Depending on the similarity measure. • The ability to discover some or all of the hidden patterns. Clustering Approaches • K-means • Hierarchical Clustering
  • 26. Clustering for Intrusion Detection Anomaly detection. Any significant deviations from the expected behavior are reported as possible attacks. Build clusters as models for normal activities.
  • 27. Data Preprocessing Extract the “connection” level features: • Record connection attempts • Watch how connection is terminated Each record has: • start time and duration • participating hosts and ports (applications) • statistics (e.g., # of bytes) • flag: normal or a connection/termination error • protocol: TCP or UDP Divide connections into 3 types: incoming, out-going, and inter-lan
  • 28. commentsTypical time complexityAlgorithm e: number of epochs k: number of neurons O(emnk)ANN O(𝑛3)Accusation Rules O(mn)Bayesian Network i: number of iterations until threshold is reached k: number of clusters O(kmni)Clustering K-mean O(mn)Naïve Bayes O(𝑛2)SVM Complexity of Algorithms During Training
  • 29. Conclusion Data mining has great potential as a malware detection tool. It allows you to analyze huge sets of information and extract new knowledge from it. The main benefit of using data mining techniques for detecting malicious software is the ability to identify both known and zero-day attacks. However, since a previously unknown but legitimate activity may also be marked as potentially fraudulent, there’s the possibility for a high rate of false positives.