Professional Documents
Culture Documents
net/publication/343570344
CITATIONS READS
0 369
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Harinath reddy Marthala on 11 August 2020.
the victim to click a link or malware while trying to do it differently). The victim can donate his intelligence if
he clicks on the link. Attackers can use social engineering to convince their victims or send an email. Even
phones are not considered safe when it comes to this type of attack. Creative activities include pocket, art and
spam.
USE OF SPAM MACHINE LEARNING MACHINE
Spam email is still considered one of the most common areas where electronic learning is used in
cybersecurity. It is also one of the first camps where attackers use machine learning to spread cybersecurity
attacks. In this case, the attackers are able to train the neural network to make unhealthy emails without raising
suspicions instead of producing manuscripts manually. Imitating people when talking about email is not easy.
For example, an employer may ask employees to change passwords in an email, the employer may not be able
to write the message in the same way when given another chance. Therefore, it is difficult for attackers to be
able to imitate someone else when confronted with a text message. There is, however, a type of message that is
increasingly prone to imitation. These messages are currently being considered and are in danger of being
named.
THE USE OF MACHINE LEARNING IS A CRIME OF IDENTITY THEFT
It has been found that the crime of stealing sensitive public information is more profitable than entering
information via email. The advantage is that social media has limited access to personal or public information.
One can easily learn the behavior of another by simply posting. Profit and one of the reasons machine learning
is a common method used to obtain relevant personal information through social media. These ideas have also
been confirmed in a recent study conducted by identifying data science for social media automation E2E spear
spear on Twitter. Research also shows how accurate modern machine learning techniques are compared to
traditional methods and textbook methods. Machine learning has an accurate level of 66% of the attempted
crime of identity theft. Markov's model is used as an example of a machine learning platform. The model is able
to generate tweets based on previous user-generated tweets. The results were compared with the results of a
normal neural network. The level of accuracy was higher than the need to improve interventions that could be
put in place to prevent the use of electronic learning software.
HOW TO USE MACHINE LEARNING IN PERSONALIZATION IN SPOOFING
A new era of artificial intelligence has brought about improvements in technology and new strategies for
creating fake content. Various companies have been able to create fake words, videos, and text messages. One
of the companies that has been in the headlines is Lyrebird Company which deals with videos and media that
can speak as a person directly. The company recently demonstrated how a bot made with its own ability to
mimic voices and communicate well with just one person. With emerging networks and a growing amount of
data, hackers are able to perform better compared to companies like Lyrebird. Hackers probably don't know how
Lyrebird machine learning technology works, but they can have other open platforms like Google Wave Net that
can do the same. These platforms are able to use anti-disruptive networks. The existence of such platforms
makes machine learning a common place for attackers to learn by pretending to be non-robbery. These are
platforms
INFORMATION GATHERING
www.iejrd.com 2
Vol.3
International Engineering Journal For Research & Development Issue 1
Every cyber attack starts with data collection. It is the first step in cyber attacks. The better the details and the
attackers are able to get, the better prospects the success the attacker can have. The information circle can be
divided into different groups and collected offline or online.
COLLECT INFORMATION ABOUT PEOPLE ONLINE IN ML
When it comes to preparing for a criminal attack on identity theft, hackers may use distinctive techniques
to identify the victim as belonging to the appropriate group. So, it means when you try to break in; The attackers
will collect information such as thousands of emails but will only send malware information to those who may
click on the link due to their vulnerability. The method helps attackers reduce the chances of early detection.
Separation is another method used by invaders to make their intentions unaware of future invading threats.
There are also cases where a cybercriminal has no specific target when collecting information. This type of
separation is related to the victim's resolution. Machine learning can help the abuser if he has a picture of the
victim. Finding social media accounts can also be made easier by using face recognition tools and photos. Once
the attacker has information on social media accounts, he will use the information to carry out the attack.
COLLECTING INFORMATION ABOUT OFFLINE PEOPLE USING LEARNING
TOOLS
Machine learning is not only used for online hacking efforts, but also for offline people. Research has
shown people who are offline are being attacked with the same attacks as people who are online. The attacker
will first initiate general information about the person. In the first stage, the attacker may hire machine learning
to have general information. The little information collected through machine learning may not be enough. It
may require physical contact with the victim. The attacker, however, may enter the building to read to the victim
and gather more information before attempting to defraud. However, at Ted's research table, new technologies
have been discovered that can detect important signs of intruders and arouse suspicion through alarms.
Cybersecurity experts say that while this may be a key factor in the development of cybersecurity, it could also
be used by attackers to promote their offline attacks. There are several other ways attackers can collect
information about offline people. These techniques should be sufficient for the electronic learning method of
data collection. The success of the hacking operation will depend largely on the information collected by the
attacker.
COLLECTING INFORMATION ONLINE AND OFFLINE OFFLINE
IT assets are a common target for hackers before the onset of attacks on their victims. IT assets provide
important information that can also be used by hackers. Machine learning also provides real-time help to gather
information about IT assets, both online and offline. Based on the Internet, it has been found that algorithms
available on specific software and networks are able to extract this information. The current generation of
networks based on network-defined networks (SDN) has been found to be very difficult. Machine learning helps
opponents of these problems. One example is the Know Your Enemy (KYE) attack that enables you to collect
intelligence by plotting a specific SDN attack. This example is a good example of how machine learning is used
to collect data. On the other hand, based on the collection of IT assets offline, research shows that attackers will
collect equipment such as cameras and other acquisition devices found in the building and use them to collect
data. Machine learning will be used to produce algorithms for streaming videos as well collect information as
we need.
www.iejrd.com 3
Vol.3
International Engineering Journal For Research & Development Issue 1
UNAUTHORIZED ACCESS
Among the top methods of cyber attacks unauthorized access. In a study of potential victims of cyber-
attacks in Australia including companies as victims, unauthorized access was listed as one of the most common
methods used by attackers to launch attacks on their victims. It’s a broad topic; however, there are two common
areas where machine learning helps hackers. These areas include password brute Force and password.
One of the major methods attackers use to mimic unauthorized access to user accounts. The only way to
access unauthorized access to the account is to cause the account to be undone. Bulk hacking may have a
Captcha pass. Computer programs can be configured to solve Captcha tests and have access to the account or
have information from the victim's browsing sites. The first study focusing on the level of Captcha bypass
accuracy was conducted in 2012. Fernando Ulela, Claudia Cruz and Leonardo Reyes wrote this article. Studies
have shown 82% of the accuracy of one Captcha bypass method. Methods used for vector support devices
(SVM) Over time, separate studies have been performed similarly to assess the level of accuracy of obtaining
unauthorized access to user accounts. Another article published in 2016 showed a 92% accuracy rate. The
current image rental study used to break the IRCTC CAPTCHA showed 95% accuracy. Technological
advancement and continuous development of attackers' skills will improve the level of accuracy. Experts
provide a 98% accuracy level in the coming years.
www.iejrd.com 4
Vol.3
International Engineering Journal For Research & Development Issue 1
Studies have shown that the majority of victims are employees of the company. It is therefore
recommended that the manager in the organization provide its employees with these protective skills. The most
recommended Captcha security tool has stronger passwords than simple ones. In addition, victims are
encouraged to use MathCaptcha in case of attempted intrusion. Another common type of attack that requires
self-defense is a distributed defense system. Web servers play a role in reducing the ban on job distribution. The
www.iejrd.com 5
Vol.3
International Engineering Journal For Research & Development Issue 1
protection strategy includes identifying traffic patterns, incoming traffic, and the separation of stolen web
browsers and traffic from people like bots. The filtering process using technologies such as connection tracking
and other DDOS protection software is a course of action one can take when it comes to service division. Other
recommendations include sorting and sorting.
CONCLUSION
Different types of attack methods use a machine to read. It has been used to increase attack methods into
higher values. The methods, as discussed in this paper, include characters, data collection, and attacks, among
others. Many people continue to be victims of these attacks because of their weaknesses. Architecture and
machine learning are blessings and curses. There is a need for an effective defense system for these types of
attacks. One of the most effective ways to reduce hacking is to raise awareness among potential victims. Making
these people aware of these things will equip them with the right defense and defense before and during the
attack.
REFERENCES
1. Ateniese, G., Felici, G., Mancini, L. V., Spognardi, A., Villani, A., & Vitali, D. (2013). Hacking smart
machines with smarter ones: How to extract meaningful data from machine learning classifiers. arXiv
preprint arXiv:1306.4447.
2. Bhardwaj, M., & Singh, G. P. (2011). Types of hacking attack and their countermeasure. Int. J. Educ.
Plann. Admin, 1(1), 43-53.
3. Chen, T. S., Jeng, F. G., & Liu, Y. C. (2016, December). Hacking tricks toward security on network
environments. In 2016 Seventh International Conference on Parallel and Distributed Computing,
Applications and Technologies (PDCAT'06) (pp. 442-447). IEEE.
4. Rahul Reddy Nadikattu, " CONTENT ANALYSIS OF AMERICAN & INDIAN COMICS ON
INSTAGRAM USING MACHINE LEARNING", International Journal of Creative Research Thoughts
(IJCRT), ISSN:2320-2882, Volume.2, Issue 3, pp.86-103, September 2014
5. http://doi.one/10.1729/Journal.24194
6. Cobb, S., & Lee, A. (2014, June). Malware is called malicious for a reason: The risks of weaponizing
code. In 2014 6th International Conference On Cyber Conflict (CyCon 2014) (pp. 71-84). IEEE.
8. http://doi.one/10.1729/Journal.24133
9. Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks:
Phishing attack. In 2016 international conference on computing, communication and automation
(ICCCA) (pp. 537-540). IEEE.
10. Korb, K. B. (2014). Introduction: Machine learning as philosophy of science. Minds and Machines,
14(4), 433-440.
www.iejrd.com 6
Vol.3
International Engineering Journal For Research & Development Issue 1
11. Koval, N. (2015). Revolution hacking. Cyber war in perspective: Russian aggression against Ukraine,
55-58.
12. Marchal, S., François, J., State, R., & Engel, T. (2014, November). PhishScore: Hacking phishers'
minds. In 10th International Conference on Network and Service Management (CNSM) and Workshop
(pp. 46-54). IEEE.
13. Michie, D., Spiegelhalter, D. J., & Taylor, C. C. (2012). Machine learning. Neural and Statistical
Classification, 13.
14. Mirkovic, J., Prier, G., & Reiher, P. (2002, November). Attacking DDoS at the source. In 10th IEEE
International Conference on Network Protocols, 2002. Proceedings. (pp. 312-321). IEEE.
15. Mitchell, T. M. (2006). The discipline of machine learning (Vol. 9). Pittsburgh, PA: Carnegie Mellon
University, School of Computer Science, Machine Learning Department.
16. Rodriguez, C., & Martinez, R. (2012). The Growing Hacking Threat to Websites: An Ongoing
Commitment to Web Application Security. A Frost & Sullivan White Paper; Frost and Sullivan: San
Antonio, TX, USA.
17. Seufert, S., & O'Brien, D. (2012, June). Machine learning for automatic defence against distributed
denial of service attacks. In 2007 IEEE International Conference on Communications (pp. 1217-1222).
IEEE.
18. Stamp, M. (2017). Introduction to machine learning with applications in information security.
Chapman and Hall/CRC.
19. Tal, Y., & Miron, N. (2012). U.S. Patent Application No. 13/481,964.
www.iejrd.com 7