MACHINE LEARNING IN HACKING ATTEMPTS

Abstract View PDF Download PDF

##plugins.themes.academic_pro.article.main##

Abstract

Hacking cases were common, especially in the modern world. People continue to be victims of burglary. There has been extensive research into various types of hacking techniques. However, there are a few types of research done to show how to use machine learning to accomplish different types of illegal attacks. Experts have been able to deceive machines into all sorts of illegal attacks. This paper takes the research perspective of how machine learning provides success in illegal hacking efforts. The methods used in this study are mainly reviews of previous studies conducted for the same. Details are also collected based on the imagination present in the field. Various types of attack methods that use machine learning, such as simulation, service rejection, and data collection are discussed. The paper also includes defense strategies and recommendations on how to deal with hacking attempts involving machine learning.

##plugins.themes.academic_pro.article.details##

How to Cite
[1]
“MACHINE LEARNING IN HACKING ATTEMPTS”, IEJRD - International Multidisciplinary Journal, vol. 3, no. 1, p. 7, Jan. 2018.

References

  1. Ateniese, G., Felici, G., Mancini, L. V., Spognardi, A., Villani, A., & Vitali, D. (2013). Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. arXiv preprint arXiv:1306.4447.
  2. Bhardwaj, M., & Singh, G. P. (2011). Types of hacking attack and their countermeasure. Int. J. Educ. Plann. Admin, 1(1), 43-53.
  3. Chen, T. S., Jeng, F. G., & Liu, Y. C. (2016, December). Hacking tricks toward security on network environments. In 2016 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06) (pp. 442-447). IEEE.
  4. Rahul Reddy Nadikattu, " CONTENT ANALYSIS OF AMERICAN & INDIAN COMICS ON INSTAGRAM USING MACHINE LEARNING", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.2, Issue 3, pp.86-103, September 2014
  5. http://doi.one/10.1729/Journal.24194
  6. Cobb, S., & Lee, A. (2014, June). Malware is called malicious for a reason: The risks of weaponizing code. In 2014 6th International Conference On Cyber Conflict (CyCon 2014) (pp. 71-84). IEEE.
  7. Rahul Reddy Nadikattu, "FUNDAMENTAL APPLICATIONS OF MACHINE LEARNING ACROSS THE GLOBE", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.6, Issue 1, pp.31-40, January 2018
  8. http://doi.one/10.1729/Journal.24133
  9. Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication and automation (ICCCA) (pp. 537-540). IEEE.
  10. Korb, K. B. (2014). Introduction: Machine learning as philosophy of science. Minds and Machines, 14(4), 433-440.
  11. Koval, N. (2015). Revolution hacking. Cyber war in perspective: Russian aggression against Ukraine, 55-58.
  12. Marchal, S., François, J., State, R., & Engel, T. (2014, November). PhishScore: Hacking phishers' minds. In 10th International Conference on Network and Service Management (CNSM) and Workshop (pp. 46-54). IEEE.
  13. Michie, D., Spiegelhalter, D. J., & Taylor, C. C. (2012). Machine learning. Neural and Statistical Classification, 13.
  14. Mirkovic, J., Prier, G., & Reiher, P. (2002, November). Attacking DDoS at the source. In 10th IEEE International Conference on Network Protocols, 2002. Proceedings. (pp. 312-321). IEEE.
  15. Mitchell, T. M. (2006). The discipline of machine learning (Vol. 9). Pittsburgh, PA: Carnegie Mellon University, School of Computer Science, Machine Learning Department.
  16. Rodriguez, C., & Martinez, R. (2012). The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security. A Frost & Sullivan White Paper; Frost and Sullivan: San Antonio, TX, USA.
  17. Seufert, S., & O'Brien, D. (2012, June). Machine learning for automatic defence against distributed denial of service attacks. In 2007 IEEE International Conference on Communications (pp. 1217-1222). IEEE.
  18. Stamp, M. (2017). Introduction to machine learning with applications in information security. Chapman and Hall/CRC.
  19. Tal, Y., & Miron, N. (2012). U.S. Patent Application No. 13/481,964.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.