Abstract
The growing use of the Internet in every life area creates an emerging need to provide information security (IS), and numerous classification algorithms approach this problem. This study provides a systematic literature review on the classification algorithms applications for information security on the Internet and cybersecurity. The classification algorithms use cases considered are abusive content, malicious code, information gathering, intrusion attempts, intrusions, availability, information content security, fraud, and vulnerable. As many research papers on that topic were published, this research focuses on recent studies from 2015 to 2020 and includes new areas, like mobile devices and the Internet of things (IoT). The analysis of 1446 selected publications provides insights on classification algorithms applied to IS tasks, their popularity, and the algorithm selection challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed A, Krishnan V, Foroutan S et al (2018) Cyber physical security analytics for anomalies in transmission protection systems. IEEE Ind Appl Soc Annu Meet (IAS) 2018:1–8
Al-Azani S, El-Alfy EM (2018) Imbalanced sentiment polarity detection using emoji-based features and bagging ensemble. In: 2018 1st International conference on computer applications and information security (ICCAIS), pp 1–5
Ambusaidi MA, He X, Nanda P et al (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65:2986–2998
Apruzzese G, Colajanni M, Ferretti L et al. (2018) On the effectiveness of machine and deep learning for cyber security. In: 2018 10th international conference on cyber conflict (CyCon), pp 371–390
Brecht M, Nowey T (2013) A closer look at information security costs. In: Böhme R (ed) The economics of information security and privacy. Springer, Berlin, Heidelberg, pp 3–24
California State Legislature (2018) California consumer privacy act of 2018. http://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5. Accessed on 25 Oct 2020
Chio C, Freeman D (2018) Machine learning and security. O’Reilly Media Inc, Massachusetts
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273–297
European Parliament and Council of European Union (2016) Regulation (EU) 2016/679. https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EN. Accessed on 25 Oct 2020
European Union (2020) Ordering or buying goods and services. https://ec.europa.eu/eurostat/statistics-explained/index.php/Digital_economy_and_society_statistics_-_households_and_individuals#Services_ordered_from_other_individuals_via_the_internet. Accessed on 27 Oct 2020
European Union Agency for Network and Information Security (ENISA) (2018) Reference incident classification taxonomy. https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/at_download/fullReport. Accessed on 25 Oct 2020
Ferrag MA, Shu L, Yang X et al (2020) Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access 8:32031–32053
Gurulakshmi K, Nesarani A (2018) Analysis of IoT bots against DDOS attack using machine learning algorithm. In: 2018 2nd International conference on trends in electronics and informatics (ICOEI), pp 1052–1057
Haibo H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21:1263–1284
Ho TK (1995) Random decision forests. In: Proceedings of the 3rd international conference on document analysis and recognition, pp 278–282
Hou J, Fu P, Cao Z et al (2018) Machine learning based DDos detection through NetFlow analysis. MILCOM 2018—2018 IEEE military communications conference (MILCOM)
iA Internet Association (2020) IA Industry Indicators. Data and analysis for the U.S. internet industry. Q1 2020 Data, Q3 2020 Release. https://internetassociation.org/wp-content/uploads/2020/09/IA_Internet-Industry-Indicators-Report_Q3-2020_digital.pdf. Accessed on 27 Oct 2020
Jindal A, Dua A, Kaur K et al (2016) Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Trans Industr Inf 12:1005–1016
Jing X, Yan Z, Pedrycz W (2018) Security data collection and data analytics in the internet: a survey. IEEE Commun Surv Tutorials 21:586–618
Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. Eur Conf Mach Learn 1398:137–142
Kaur R, Bansal M (2016) Multidimensional attacks classification based on genetic algorithm and SVM. In: 2016 2nd International conference on next generation computing technologies (NGCT), pp 561–565
Kent K, Souppaya M (2006) NIST SP 800-92. Guide to computer security log management
Kim J, Kim J, Thi Thu HL et al (2016) Long short term memory recurrent neural network classifier for intrusion detection. Int Conf Platform Technol Serv (PlatCon) 2016:1–5
Langley P, Iba W, Thompson K (1992) An analysis of Bayesian classifiers. In: AAAI’92: proceedings of the tenth national conference on artificial intelligence vol 90, pp 223–228
LeCun Y, Haffner P, Bottou L et al (1999) Object recognition with gradient-based learning. Shape, contour and grouping in computer vision lecture notes in computer science vol, 1681, pp 319–345
Liderman K (2017) Bezpieczeństwo informacyjne. Wydawnictwo Naukowe PWN, Warszawa
Liu K, Fan Z, Liu M et al (2018) Hybrid intrusion detection method based on K-Means and CNN for smart home. In: 2018 IEEE 8th annual international conference on CYBER technology in automation, control, and intelligent systems (CYBER), pp 312–317
Masood F, Ammad G, Almogren A et al (2019) Spammer detection and fake user identification on social networks. IEEE Access 7:68140–68152
Nieles M, Dempsey K, Pillitteri VY (2017) Special Publication (NIST SP)—800-12 Rev. 1. An introduction to information security
Office of the Australian Information Commissioner (1988) Australian Privacy Principles. https://www.oaic.gov.au/privacy/australian-privacy-principles/. Accessed on 25 Oct 2020
Office of the Privacy Commissioner of Canada (2000) The personal information protection and electronic documents act (PIPEDA). https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/. Accessed on 25 Oct 2020
Paxson V (1998) Bro: a system for detecting network intruders in real-time. 7th USENIX Secur Symp 31(23–24):2435–2463
Quinlan JR (1986) Induction of decision trees. Mach Learn 1:81–106
Roesch M (1999) Snort—lightweight intrusion detection for networks. LISA ‘99: 13th Syst Admin Conf 99(1):229
Ryzko D (2020) Modern big data architectures. John Wiley & Sons, New Jersey, New York
Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339
The Regents of the University of California (1987) tcpdump. https://opensource.apple.com/source/tcpdump/tcpdump-56/tcpdump/tcpdump.1. Accessed on 17 Dec 2020
Tirunagari S, Poh N, Windridge D et al (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10:762–777
UCI KDD (1999) KDD-CUP-99 Dataset. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed on 17 Dec 2020
University of New Brunswick (2009) NSL-KDD Dataset. https://www.unb.ca/cic/datasets/nsl.html. Accessed on 17 Dec 2020
UNSW Canberra (2015) UNSW-NB15 Dataset. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/. Accessed on 18 Dec 2020
Wang J, Xu M, Wang H et al (2006) Classification of imbalanced data by using the SMOTE algorithm and locally linear embedding. In: 2006 8th international conference on signal processing, p 3
Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10:746–761
Yin C, Zhu Y, Fei J et al (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961
Zhang J, Chen X, Xiang Y et al (2015) Robust network traffic classification. IEEE/ACM Trans Networking 23:1257–1270
Zhu X, Li X, Zhang S et al (2016) Robust joint graph sparse coding for unsupervised spectral feature selection. IEEE Trans Neural Netw Learn Syst 28:1263–1275
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Bryś, M. (2021). Classification Algorithms Applications for Information Security on the Internet: A Review. In: Jajuga, K., Najman, K., Walesiak, M. (eds) Data Analysis and Classification. SKAD 2020. Studies in Classification, Data Analysis, and Knowledge Organization. Springer, Cham. https://doi.org/10.1007/978-3-030-75190-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-75190-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75189-0
Online ISBN: 978-3-030-75190-6
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)