This paper is published in Volume-5, Issue-1, 2019
Area
Computer Science
Author
Jasmine Joy J.
Co-authors
Padmashree A., Karunambika S., Latha R.
Org/Univ
KPR Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India
Pub. Date
09 February, 2019
Paper ID
V5I1-1302
Publisher
Keywords
IoT, Unsupervised Learning, Supervised Learning, Clustering

Citationsacebook

IEEE
Jasmine Joy J., Padmashree A., Karunambika S., Latha R.. Survey on clustering attacker activities in IoT data through machine learning techniques, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Jasmine Joy J., Padmashree A., Karunambika S., Latha R. (2019). Survey on clustering attacker activities in IoT data through machine learning techniques. International Journal of Advance Research, Ideas and Innovations in Technology, 5(1) www.IJARIIT.com.

MLA
Jasmine Joy J., Padmashree A., Karunambika S., Latha R.. "Survey on clustering attacker activities in IoT data through machine learning techniques." International Journal of Advance Research, Ideas and Innovations in Technology 5.1 (2019). www.IJARIIT.com.

Abstract

IoT create network and connect "things" and people together by creating relationship between either people-people, people-things or things-things. As the number of device connection is increased, it increases the Security risk. Security is the biggest issue for IoT at any companies across the globe. Privacy and data sharing can again be considered as a security concern for IoT. The IoT has been affected by different botnet activities. As botnets have the cause of serious security risks and financial damage over the years, existing Network forensic techniques cannot identify and track current sophisticated methods of botnets. Machine Learning techniques in order to train and validate a model for defining such attacks, but they still produce high false alarm rates with the challenge of investigating the tracks of botnets. This paper investigates the role of Machine Learning techniques for developing a Network forensic mechanism based on network flow identifiers that can track suspicious activities of botnets. Multivariate Hawkes Process identifies the latent influences between attackers by utilizing the mutually exciting properties. Then cluster the attacker activities based on the inferred weighted influence matrix with resort to the hierarchical, partitioning and graph-based clustering approach.