Leveraging Data Mining to Improve Internet Security

نویسندگان

  • Matthew Caesar
  • Jiawei Han
چکیده

The rich functionality of modern personal computers combined with ineffective deployment of practical security solutions opens the door to a wide variety of attacks and exploits on their applications. This in turn has led to an extremely widespread propagation of malware, or software designed to perform hostile activities without the owner’s consent. An increasingly common phenomenon is for malware to be remotely controlled over the PC’s Internet connection to form a botnet. Commoditization of botnets are used for credit card fraud, identity theft, spamming, phishing, and other attacks. Securing cyberspace, along with blocking attacks by botnets, was recently listed as one of fourteen “grand challenges” issued by the National Academy of Engineering [1]. Dealing with botnets presents a wide variety of challenges. The owner of a bot-infected machine often has no way to know their machine is infected by a bot. Even if they had some way to find out, they may lack the technical expertise required to separate and remove the bot’s code from their operating system and application software. In-network solutions for monitoring and curtailing bot behavior address this problem by observing trends across many bot-infected hosts, and allowing network operators direct control in shutting off or rate limiting bot-related traffic. However, since the amount of traffic flowing through networks is extremely large, they face scaling challenges in large networks. Moreover, given the rapid pace of change in deployed botnet code, isolating signatures of bots in the network represents a significant challenge, often requiring highly processing intensive techniques that worsen scaling problems further. In this paper, we plan to pursue two main avenues of research to counteract this threat:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation of Feature Selection and Ensemble Methods for Performance Improvement of Intrusion Attack Classification

The security of a computer system is compromised when an intrusion takes place. The popularization of shared networks and Internet usage demands increases attention on information system security. Importance of Intrusion detection system (IDS) in computer network security well proven. Data mining approach can play very important role in developing intrusion detection system. Classification is i...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Differentiated security levels for personal identifiable information in identity management system

With the rapid development of Internet services, identity management (IdM) has got widely attraction as the credit agency between users and service providers. It facilitates users to use the Internet service, promotes service providers to enrich services, and makes Internet more security. Personally identifiable information (PII) is the most important information asset with which identity provi...

متن کامل

Data Mining Techniques for Security of Web Services

The Internet, while being increasingly used to provide services efficiently, poses a unique set of security issues due to its openness and ubiquity. We highlight the importance of security in web services and describe how data mining techniques can offer help. The anatomy of a specific security attack is described. We then survey some security intrusions detection techniques based on data minin...

متن کامل

Combination of Ensemble Data Mining Methods for Detecting Credit Card Fraud Transactions

As we know, credit cards speed up and make life easier for all citizens and bank customers. They can use it anytime and anyplace according to their personal needs, instantly and quickly and without hassle, without worrying about carrying a lot of cash and more security than having liquidity. Together, these factors make credit cards one of the most popular forms of online banking. This has led ...

متن کامل

Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network: Review & Analysis

The development of Internet protocols are greatly needed as the network security becomes one of the most important issues. This brings the need to develop IPv4 into IPv6 in order to proceed towards increasing the network capacity. Now Intruders are considered as one of the most serious threats to the internet security. Data mining techniques have been successfully utilized in many applications....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008