Skip to main content

Fraudulent IP Address Detection Using Machine Learning Techniques

  • Conference paper
  • First Online:
Information Systems for Intelligent Systems (ISBM 2023)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 379))

Included in the following conference series:

  • 78 Accesses

Abstract

The popularity of network technology and the threats involved make it imperative to develop various techniques to effectively detect fraudulent activities. The focus of this paper is to discover actionable irregularity with significant potential to perceive abnormal network behavior. Three machine learning-based methods have been proposed for the analysis of suspicious network behavior. These methods are extensions of the techniques discussed as part of the introduction below. The method developed in the current work can be evaluated by testing its efficiency against real-time network attacks using available open-source network tools. Experimental results show that irregularities have been successfully identified from the dataset with a low false positive rate. Furthermore, we believe our method can be directly deployed in real-time environments (either independently of edge devices or via the cloud) to strengthen network security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chiba, D., Tobe, K., Mori, T., Goto, S.: Detecting malicious websites by learning IP address features. In: 2012 IEEE/IPSJ 12th international symposium on applications and the internet, pp. 29–39 (2012). https://doi.org/10.1109/SAINT.2012.14

  2. Ke, Q.: Research on threat detection in cyber security based on machine ... itopscience. Retrieved December 20, 2022, from https://doi.org/10.1088/1742-6596/2113/1/012074

  3. Minnesota, Y.J.U., et al.: Identifying and tracking suspicious activities through IP Gray Space Analysis. In: Proceedings of the 3rd annual ACM workshop on mining network data, ACM conferences. Available at https://dl.acm.org/doi/10.1145/1269880.1269883

  4. Yan, G., Li, Q., Guo, D., Li, B.: AULD: Large scale suspicious dns activities detection via unsupervised learning in advanced persistent threats. Sensors (Basel). 19(14), 3180 (2019). https://doi.org/10.3390/s19143180.PMID:31330986;PMCID:PMC6679267

    Article  Google Scholar 

  5. Manocha, S., Girolami, M.: An empirical analysis of the probabilistic K-nearest Neighbor Classifier. Pattern Recognit. Lett., 28: 1818–1824

    Google Scholar 

  6. Machine learning techniques for anomaly detection: An overview. Available at https://www.researchgate.net/publication/325049804_Machine_Learning_Techniques_for_Anomaly_Detection_An_Overview

  7. Sharma, R.K., Kalita, H.K., Borah, P.: Analysis of machine learning techniques based intrusion detection systems. In: Nagar, A., Mohapatra, D., Chaki, N. (eds.) Proceedings of 3rd international conference on advanced computing, networking and informatics. smart innovation, systems and technologies, vol. 44. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2529-4_51

  8. Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. In: IEEE transactions on systems, man, and cybernetics, Part C (Applications and Reviews), vol. 41, no. 1. pp. 130-139 (2011). https://doi.org/10.1109/TSMCC.2010.2050685

  9. Rouhi, R., Keynia, F., Amiri, M.: Improving the intrusion detection systems’ performance by correlation as a sample selection method. J Comput Sci Applications. 1(3), 33–38 (2013). https://doi.org/10.12691/jcsa-1-3-1

  10. Hajji, H.: Statistical analysis of network traffic for adaptive faults detection. In: 2005 IEEE trans neural networks, vol 16, no 5. pp 1053–1063 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pulkit Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, P., Razak, A. (2024). Fraudulent IP Address Detection Using Machine Learning Techniques. In: So In, C., Londhe, N.D., Bhatt, N., Kitsing, M. (eds) Information Systems for Intelligent Systems. ISBM 2023. Smart Innovation, Systems and Technologies, vol 379. Springer, Singapore. https://doi.org/10.1007/978-981-99-8612-5_23

Download citation

Publish with us

Policies and ethics