Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security
<p>Wireless local area network (WLAN) frame structure (IEEE 802.11 standard frame format).</p> "> Figure 2
<p>Internet of things (IoT) testbed environment setup.</p> "> Figure 3
<p>Algorithm 1—feature extraction.</p> "> Figure 4
<p>Log of malware behavior.</p> "> Figure 5
<p>Log files for goodware and malware.</p> "> Figure 6
<p>Initialization of CountVectorizer.</p> "> Figure 7
<p>Extraction of features.</p> "> Figure 8
<p>IoT wireless features.</p> "> Figure 9
<p>Dynamic analysis of malware features.</p> "> Figure 10
<p>Survey results on students’ answers to Q8.</p> "> Figure 11
<p>Survey results on students’ answers to Q12.</p> "> Figure 12
<p>Survey results on students’ answers to Q16.</p> ">
Abstract
:1. Introduction
2. Materials and Methods
Evaluation
3. Results
3.1. Use Case
3.2. Survey Analysis
4. Discussion
- “Is there any relation between learning materials and mastery of knowledge?”
Future Work
Author Contributions
Funding
Conflicts of Interest
References
- IOT Statistics. Available online: https://ipropertymanagement.com/iot-statistics (accessed on 14 December 2019).
- IDC Forecasts WorldWide Technology Spending on the Internet of Things to Reach $1.2 Trillion in 2022. Available online: https://www.idc.com/getdoc.jsp?containerId=prUS43994118 (accessed on 14 December 2019).
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Spathoulas, G.; Evangelatos, S.; Anagnostopoulos, M.; Mema, G.; Katsikas, S. Detection of abnormal behavior in smart-home environments. In Proceedings of the 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Piraeus, Greece, 20–22 September 2019. [Google Scholar]
- Li, H.; Ota, K.; Dong, M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Network 2018, 32, 96–101. [Google Scholar] [CrossRef] [Green Version]
- Tohari, A.; Aziz, M.N. Data Preprocessing and Feature Selection for Machine Learning Intrusion Detection Systems. ICIC Express Lett. 2019, 13, 93–101. [Google Scholar]
- Course. Available online: http://www.ricardocalix.com/teaching/teaching.htm (accessed on 10 February 2020).
- Keras. Available online: www.keras.io (accessed on 10 February 2020).
- Tensorflow. Available online: www.tensorflow.org (accessed on 10 February 2020).
- Pedregosa. Scikit-learn: Machine Learning in Python. JMLR 2011, 12, 2825–2830. [Google Scholar]
- Pandas. Available online: www.pandas.pydata.org (accessed on 10 February 2020).
- Loper, E.; Bird, S. NLTK: the Natural Language Toolkit. In Proceedings of the ETMTNLP ‘02 Proceedings of the ACL-02, Workshop on Effective tools and methodologies for teaching natural language processing and computational linguistics-Volume 1, Stroudsburg, PA, USA, 17 May 2002; pp. 63–70. [Google Scholar]
- Calix, R.A.; Sankaran, R. Feature ranking and support vector machines classification analysis of the NSL-KDD intrusion detection corpus. In Proceedings of the The Twenty-Sixth International FLAIRS Conference, St. Pete Beach, FL, USA, 22–24 May 2013. [Google Scholar]
- Cabrera, A.; Calix, R.A. On the Anatomy of the Dynamic Behavior of Polymorphic Viruses. In Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Orlando, FL, USA, 31 October–4 November 2016; pp. 424–429. [Google Scholar] [CrossRef]
- Basnet, R.; Mukkamala, S.; Sung, A.H. Detection of Phishing Attacks: A Machine Learning Approach. In Soft Computing Applications in Industry. Studies in Fuzziness and Soft Computing; Prasad, B., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; Volume 226. [Google Scholar]
- Amigud, A.; Arnedo-Moreno, J.; Daradoumis, T.; Guerrero-Roldan, A. A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment. In Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), Ostrawva, Czech Republic, 7–9 September 2016; pp. 255–262. [Google Scholar] [CrossRef]
- Calix, R. Getting Started with Deep Learning: Programming and Methodologies using Python, 1st ed.; CreateSpace Independent Publishing Platform: Scotts Valley, CA, USA, 2017. [Google Scholar]
- Iqbal, I.M.; Calix, R.A. Analysis of a Payload-based Network Intrusion Detection System Using Pattern Recognition Processors. In Proceedings of the 2016 International Conference on Collaboration Technologies and Systems (CTS), Orlando, FL, USA, 31 October–4 November 2016; pp. 398–403. [Google Scholar] [CrossRef]
- Hamed, T.; Ernst, J.B.; Kremer, S.C. A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. In Computer and Network Security Essentials; Springer: Cham, Switzerland, 2018; pp. 113–134. [Google Scholar]
- Aziz, M.; Patrot, A. Overview of malware analysis and detection. Int. J. Comput. Appl. 2015, 975, 8887. [Google Scholar]
- Firdausi, I.; Erwin, A.; Nugroho, A.S. Analysis of machine learning techniques used in behavior-based malware detection. In Proceedings of the 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, Indonesia, 2–3 December 2010. [Google Scholar]
- CyberSecTK. Available online: https://github.com/sumendrabsingh/CyberSecTK-Library (accessed on 10 February 2020).
- Scapy. Available online: https://scapy.net (accessed on 10 October 2019).
- Rajib, R.M.; Sandra, S.; Ragv, S.; Nils, O.T. Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios. In European Symposium on Research in Computer Security; Springer: Cham, Switzerland, 2017; Part II; pp. 247–264. [Google Scholar]
- Aircrack-ng. Available online: https://www.aircrack-ng.org (accessed on 10 October 2019).
- Calix, R.A.; Mallepudi, S.A.; Knapp, G.M.; Nahmens, I. Factors that Influence Usage of Knowledge Management by Information Technology Professionals at Institutions of Higher Education. J. Manag. Eng. Integr. 2010, 3, 73. [Google Scholar]
Scale | Answer |
---|---|
1 | Strongly disagree |
2 | Disagree |
3 | Neither agree nor disagree |
4 | Agree |
5 | Strongly agree |
Number | Question |
---|---|
1 | Was Weka a useful tool/topic to learn about? |
2 | Was sklearn a useful tool/topic to learn about? |
3 | Was TensorFlow a useful tool/topic to learn about? |
4 | Were the lectures helpful to better understand the topics? |
5 | Did you find the lecture and lab documents helpful to better understand the topics? |
6 | Was the use of a flash drive with a VM helpful for working on the lab problems? |
7 | Did you find the challenge data sets useful? |
8 | After this 1-week course, do you feel you have a better understanding of machine learning and how it can be applied to cyber security problems? |
9 | Did you find the use of AWS as a large data set useful to your learning? |
10 | Did you find the distribution of time between lecture and labs appropriate? |
11 | Were the video recording useful to your learning? |
12 | Overall, do you feel that you can convert raw data to the vector space model format for machine learning purpose? |
13 | Overall, do you feel you can now better analyze data sets with Weka? |
14 | Overall, do you feel you can now better analyze data sets with sklearn? |
15 | Overall, do you feel you can now better analyze data sets with TensorFlow? |
16 | Do you have a better understanding of deep neural networks and their advantages? |
17 | Comments (provide any additional comments) |
Q1 | Q2 | Q3 | ||
---|---|---|---|---|
Q12 | Correlation | –0.200 | 0.061 | –0.257 |
p-value | 0.427 | 0.809 | 0.303 | |
Q13 | Correlation | 0.033 | ||
p-value | 0.897 | |||
Q14 | Correlation | 0.238 | ||
p-value | 0.341 | |||
Q15 | Correlation | –0.213 | ||
p-value | 0.397 |
Q4 | Q5 | ||
---|---|---|---|
Q8 | Correlation | 0.537 | 0.502 |
p-value | 0.021 | 0.029 | |
Q10 | Correlation | 0.524 | |
p-value | 0.021 |
Question | Mean | SD | Minimum | Maximum |
---|---|---|---|---|
Q1 | 4.632 | 0.761 | 2 | 5 |
Q2 | 4.579 | 0.607 | 3 | 5 |
Q3 | 4.947 | 0.229 | 4 | 5 |
Q4 | 4.222 | 0.647 | 3 | 5 |
Q5 | 4.211 | 0.855 | 2 | 5 |
Q6 | 4.632 | 0.597 | 3 | 5 |
Q7 | 4.368 | 0.597 | 3 | 5 |
Q8 | 4 | 1 | 2 | 5 |
Q9 | 4.474 | 0.841 | 3 | 5 |
Q10 | 4.5 | 0.816 | 2 | 5 |
Q11 | 3.667 | 0.888 | 3 | 5 |
Q12 | 4.278 | 0.826 | 2 | 5 |
Q13 | 4.778 | 0.428 | 4 | 5 |
Q14 | 4.278 | 0.575 | 3 | 5 |
Q15 | 4.5 | 0.618 | 3 | 5 |
Q16 | 4.111 | 1.079 | 1 | 5 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Calix, R.A.; Singh, S.B.; Chen, T.; Zhang, D.; Tu, M. Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security. Information 2020, 11, 100. https://doi.org/10.3390/info11020100
Calix RA, Singh SB, Chen T, Zhang D, Tu M. Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security. Information. 2020; 11(2):100. https://doi.org/10.3390/info11020100
Chicago/Turabian StyleCalix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. 2020. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security" Information 11, no. 2: 100. https://doi.org/10.3390/info11020100
APA StyleCalix, R. A., Singh, S. B., Chen, T., Zhang, D., & Tu, M. (2020). Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security. Information, 11(2), 100. https://doi.org/10.3390/info11020100