You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/343570344

MACHINE LEARNING IN HACKING ATTEMPTS

Article · January 2018

CITATIONS READS

0 369

1 author:

Harinath reddy Marthala


RMIT University
2 PUBLICATIONS   0 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

MACHINE LEARNING IN HACKING ATTEMPTS View project

ROLE OF ARTIFICIAL INTELLIGENCE IN IT FIELDS View project

All content following this page was uploaded by Harinath reddy Marthala on 11 August 2020.

The user has requested enhancement of the downloaded file.


Vol.3
International Engineering Journal For Research & Development Issue 1

E-ISSN NO:-2349-0721 Impact factor : 6.549

MACHINE LEARNING IN HACKING ATTEMPTS


Harinath Reddy
RMIT University, Department of Information Technology, Australia
----------------------------------------------------------------------------------------------------------------------------- ----------
ABSTRACT
Hacking cases were common, especially in the modern world. People continue to be victims of burglary.
There has been extensive research into various types of hacking techniques. However, there are a few types of
research done to show how to use machine learning to accomplish different types of illegal attacks. Experts have
been able to deceive machines into all sorts of illegal attacks. This paper takes the research perspective of how
machine learning provides success in illegal hacking efforts. The methods used in this study are mainly reviews
of previous studies conducted for the same. Details are also collected based on the imagination present in the
field. Various types of attack methods that use machine learning, such as simulation, service rejection, and data
collection are discussed. The paper also includes defense strategies and recommendations on how to deal with
hacking attempts involving machine learning.
Bright words: Machine learning, cybersecurity, attack, hacking.
INTRODUCTION
The development of electronic learning has become an important factor in the field of cybersecurity.
Machine learning is the use of artificial intelligence to provide systems with the ability to automatically read and
develop from information without programming. Machine learning focuses on computer programs that can
access data and use it to learn for themselves. It continues to be critical to cybersecurity. Architecture and
mechanization have taken cybersecurity by storm. Hacking has been one of the major concerns when it comes to
cybersecurity. Recent developments show that machine learning is considered one of the platforms used by
website attackers to explode. The purpose of this paper is to provide an analysis of the machine learning method
used for robbery attempts.
BACKGROUND INFORMATION
Hacking has been around for the past ten years. There have been several reports of hacking worldwide. In
2017, the U.S. intelligence community reported more than 200,000 hacking cases. Attackers continue to come
up with different ways to hack people’s websites and accounts. The motive for these attacks is different and may
include subtle attacks, among others. The most common motive, according to the analysis done in most cases, is
robbery. The presence of artificial intelligence has continued to add fraudulent activities. Cybersecurity experts
say the deployment of artificial intelligence could pose a cybersecurity threat. The same is true of machine
learning. Therefore, there is an ongoing need to come up with effective ways to prevent cracks before they
happen. Machine learning is involved in a number of activities in relation to power-cutting efforts. These
activities are divided into data collection, impersonation, attack, automation and unauthorized access.
IMPERSONATION
Impersonation is one of the main ways criminals use cybercrime to attack their victims. There are
different types of attacks, and it all depends on the need and the social network. Attackers can easily convince
www.iejrd.com 1
Vol.3
International Engineering Journal For Research & Development Issue 1

the victim to click a link or malware while trying to do it differently). The victim can donate his intelligence if
he clicks on the link. Attackers can use social engineering to convince their victims or send an email. Even
phones are not considered safe when it comes to this type of attack. Creative activities include pocket, art and
spam.
USE OF SPAM MACHINE LEARNING MACHINE
Spam email is still considered one of the most common areas where electronic learning is used in
cybersecurity. It is also one of the first camps where attackers use machine learning to spread cybersecurity
attacks. In this case, the attackers are able to train the neural network to make unhealthy emails without raising
suspicions instead of producing manuscripts manually. Imitating people when talking about email is not easy.
For example, an employer may ask employees to change passwords in an email, the employer may not be able
to write the message in the same way when given another chance. Therefore, it is difficult for attackers to be
able to imitate someone else when confronted with a text message. There is, however, a type of message that is
increasingly prone to imitation. These messages are currently being considered and are in danger of being
named.
THE USE OF MACHINE LEARNING IS A CRIME OF IDENTITY THEFT
It has been found that the crime of stealing sensitive public information is more profitable than entering
information via email. The advantage is that social media has limited access to personal or public information.
One can easily learn the behavior of another by simply posting. Profit and one of the reasons machine learning
is a common method used to obtain relevant personal information through social media. These ideas have also
been confirmed in a recent study conducted by identifying data science for social media automation E2E spear
spear on Twitter. Research also shows how accurate modern machine learning techniques are compared to
traditional methods and textbook methods. Machine learning has an accurate level of 66% of the attempted
crime of identity theft. Markov's model is used as an example of a machine learning platform. The model is able
to generate tweets based on previous user-generated tweets. The results were compared with the results of a
normal neural network. The level of accuracy was higher than the need to improve interventions that could be
put in place to prevent the use of electronic learning software.
HOW TO USE MACHINE LEARNING IN PERSONALIZATION IN SPOOFING
A new era of artificial intelligence has brought about improvements in technology and new strategies for
creating fake content. Various companies have been able to create fake words, videos, and text messages. One
of the companies that has been in the headlines is Lyrebird Company which deals with videos and media that
can speak as a person directly. The company recently demonstrated how a bot made with its own ability to
mimic voices and communicate well with just one person. With emerging networks and a growing amount of
data, hackers are able to perform better compared to companies like Lyrebird. Hackers probably don't know how
Lyrebird machine learning technology works, but they can have other open platforms like Google Wave Net that
can do the same. These platforms are able to use anti-disruptive networks. The existence of such platforms
makes machine learning a common place for attackers to learn by pretending to be non-robbery. These are
platforms
INFORMATION GATHERING

www.iejrd.com 2
Vol.3
International Engineering Journal For Research & Development Issue 1

Every cyber attack starts with data collection. It is the first step in cyber attacks. The better the details and the
attackers are able to get, the better prospects the success the attacker can have. The information circle can be
divided into different groups and collected offline or online.
COLLECT INFORMATION ABOUT PEOPLE ONLINE IN ML
When it comes to preparing for a criminal attack on identity theft, hackers may use distinctive techniques
to identify the victim as belonging to the appropriate group. So, it means when you try to break in; The attackers
will collect information such as thousands of emails but will only send malware information to those who may
click on the link due to their vulnerability. The method helps attackers reduce the chances of early detection.
Separation is another method used by invaders to make their intentions unaware of future invading threats.
There are also cases where a cybercriminal has no specific target when collecting information. This type of
separation is related to the victim's resolution. Machine learning can help the abuser if he has a picture of the
victim. Finding social media accounts can also be made easier by using face recognition tools and photos. Once
the attacker has information on social media accounts, he will use the information to carry out the attack.
COLLECTING INFORMATION ABOUT OFFLINE PEOPLE USING LEARNING
TOOLS
Machine learning is not only used for online hacking efforts, but also for offline people. Research has
shown people who are offline are being attacked with the same attacks as people who are online. The attacker
will first initiate general information about the person. In the first stage, the attacker may hire machine learning
to have general information. The little information collected through machine learning may not be enough. It
may require physical contact with the victim. The attacker, however, may enter the building to read to the victim
and gather more information before attempting to defraud. However, at Ted's research table, new technologies
have been discovered that can detect important signs of intruders and arouse suspicion through alarms.
Cybersecurity experts say that while this may be a key factor in the development of cybersecurity, it could also
be used by attackers to promote their offline attacks. There are several other ways attackers can collect
information about offline people. These techniques should be sufficient for the electronic learning method of
data collection. The success of the hacking operation will depend largely on the information collected by the
attacker.
COLLECTING INFORMATION ONLINE AND OFFLINE OFFLINE
IT assets are a common target for hackers before the onset of attacks on their victims. IT assets provide
important information that can also be used by hackers. Machine learning also provides real-time help to gather
information about IT assets, both online and offline. Based on the Internet, it has been found that algorithms
available on specific software and networks are able to extract this information. The current generation of
networks based on network-defined networks (SDN) has been found to be very difficult. Machine learning helps
opponents of these problems. One example is the Know Your Enemy (KYE) attack that enables you to collect
intelligence by plotting a specific SDN attack. This example is a good example of how machine learning is used
to collect data. On the other hand, based on the collection of IT assets offline, research shows that attackers will
collect equipment such as cameras and other acquisition devices found in the building and use them to collect
data. Machine learning will be used to produce algorithms for streaming videos as well collect information as
we need.

www.iejrd.com 3
Vol.3
International Engineering Journal For Research & Development Issue 1

UNAUTHORIZED ACCESS
Among the top methods of cyber attacks unauthorized access. In a study of potential victims of cyber-
attacks in Australia including companies as victims, unauthorized access was listed as one of the most common
methods used by attackers to launch attacks on their victims. It’s a broad topic; however, there are two common
areas where machine learning helps hackers. These areas include password brute Force and password.
One of the major methods attackers use to mimic unauthorized access to user accounts. The only way to
access unauthorized access to the account is to cause the account to be undone. Bulk hacking may have a
Captcha pass. Computer programs can be configured to solve Captcha tests and have access to the account or
have information from the victim's browsing sites. The first study focusing on the level of Captcha bypass
accuracy was conducted in 2012. Fernando Ulela, Claudia Cruz and Leonardo Reyes wrote this article. Studies
have shown 82% of the accuracy of one Captcha bypass method. Methods used for vector support devices
(SVM) Over time, separate studies have been performed similarly to assess the level of accuracy of obtaining
unauthorized access to user accounts. Another article published in 2016 showed a 92% accuracy rate. The
current image rental study used to break the IRCTC CAPTCHA showed 95% accuracy. Technological
advancement and continuous development of attackers' skills will improve the level of accuracy. Experts
provide a 98% accuracy level in the coming years.

USE OF BRUTE FORCE PASSWORD READING MACHINE


Machine learning is also used to create passwords. If the operator is able to train the network on common
passwords, the network will be able to generate the same. These were common ideas that researchers had in
mind and were experimenting with. You have produced good results. Password generating networks have been
found to be much better than traditional conversion protocols and have a higher level of accuracy. For example,
a password list that includes a token can generate a password from "s" to "$". The idea of this attack is to
generate a password list and use it for trial and error. If hackers have as many passwords as possible, then it
could be easy for one of them to have the exact password they want. Therefore, it is important for people to have
a strong password. Password-generating software is considered one of the safest ways to avoid potential attacks
by hackers.

MACHINE LEARNING FOR ATTACKS


Many of the methods that have been analyzed are the methods used in the attacks of hijackers while using
a learning machine. Machine learning is also used during a direct extermination effort and not to prepare for an
illegal entry attempt. The three targets of the attack, including deception, extinction, and espionage, are carried
out by malicious programs including malware, malware, or spyware.
MALWARE / RHLENGWARE / SPYWARE
Cybercriminals can use learning tools to create malware. One of the ways they do this is to strengthen
teaching and learning. For example, an attacker can take malware, modify it, and send it to VirusTotal, check
the results, and make any other necessary changes. Face recognition can also be used to carry out these attacks.
Malware becomes another common platform where the use of the machine is used by hackers to attack people
by attacking the website.

www.iejrd.com 4
Vol.3
International Engineering Journal For Research & Development Issue 1

USE OF MACHINE LEARNING DENIAL OF SERVICE


The rejection of the distribution of the app is one of the most common tactics attacked by self-proclaimed
consumers when it comes to actual attacks. Like other methods of attack, rejection of the app is also enabled by
machine learning. In this way, attackers flood the website with a large number of traffic that cannot be managed
to block all users from accessing. A website can be set up to host a certain number of users. When the number of
users increases, the performance of the website will be in line, and it can be easily closed. This is the basis used
by the attackers for this type of attack. When all users are denied access, they then achieve their target of attack.
Attackers may try to make a denial-of-distribution distribution to acquire different fields. Attackers will rely on
artificial intelligence to produce different DDoS packets, almost identical to the actual user actions.

APPLICATION OF CYBERCRIME AUTOMATION MACHINE LEARNING


There are experienced hackers who can use learning equipment to perform various tasks in a number of
locations. The advantage you have is that it is almost impossible to predict what will improve. Automation
began in 2015, and many organizations became victims of attacks. Recent developments show that many
organizations are aware of this type of attack. Organizations have different types of software, including bots and
social media platforms to reduce the risk of attack. Automatic is the most common form of attack that an
organization should be aware of and come up with interventions that prevent the use of a learning tool to
increase the type of website attack.

PROTECTION AND RECOMMENDATIONS


Machine learning and artificial intelligence continue to be dangerous for hackers to come up with new
hacking methods and make victims of illegal entry vulnerable to these attacks. Machine learning has provided
an opportunity for hackers to attack their victims. There is a need to come up with an effective defense that
directly directs the methods used in machine learning.

OTHER POTENTIAL RECOMMENDATIONS


The only way to secure information online is not to upload information online. The most effective way to
protect a person from hacking is to have a secure source of information. There are general information that can
be published online. One should avoid publishing confidential or misleading information. With regard to
impersonation, research has shown that it will require more than self-defense to eliminate fake messages and
other forms of imitation. The United States Department of Defense came up with a tool that was used to provide
green video solutions. The tool, deep deception, is a tool that finds error-free videos instead of fake face format.
According to the tool, a fake video face may have been announced which is why it gives victims a chance to
find a fake video. The intelligence base developed and developed a tool that captured the real defender that
distinguishes between false and real stories. The tool uses browser plugins. Therefore, it is necessary for people
who are considered to be the most aggressive attackers to be armed with these security systems.

Studies have shown that the majority of victims are employees of the company. It is therefore
recommended that the manager in the organization provide its employees with these protective skills. The most
recommended Captcha security tool has stronger passwords than simple ones. In addition, victims are
encouraged to use MathCaptcha in case of attempted intrusion. Another common type of attack that requires
self-defense is a distributed defense system. Web servers play a role in reducing the ban on job distribution. The
www.iejrd.com 5
Vol.3
International Engineering Journal For Research & Development Issue 1

protection strategy includes identifying traffic patterns, incoming traffic, and the separation of stolen web
browsers and traffic from people like bots. The filtering process using technologies such as connection tracking
and other DDOS protection software is a course of action one can take when it comes to service division. Other
recommendations include sorting and sorting.

CONCLUSION
Different types of attack methods use a machine to read. It has been used to increase attack methods into
higher values. The methods, as discussed in this paper, include characters, data collection, and attacks, among
others. Many people continue to be victims of these attacks because of their weaknesses. Architecture and
machine learning are blessings and curses. There is a need for an effective defense system for these types of
attacks. One of the most effective ways to reduce hacking is to raise awareness among potential victims. Making
these people aware of these things will equip them with the right defense and defense before and during the
attack.

REFERENCES
1. Ateniese, G., Felici, G., Mancini, L. V., Spognardi, A., Villani, A., & Vitali, D. (2013). Hacking smart
machines with smarter ones: How to extract meaningful data from machine learning classifiers. arXiv
preprint arXiv:1306.4447.

2. Bhardwaj, M., & Singh, G. P. (2011). Types of hacking attack and their countermeasure. Int. J. Educ.
Plann. Admin, 1(1), 43-53.

3. Chen, T. S., Jeng, F. G., & Liu, Y. C. (2016, December). Hacking tricks toward security on network
environments. In 2016 Seventh International Conference on Parallel and Distributed Computing,
Applications and Technologies (PDCAT'06) (pp. 442-447). IEEE.

4. Rahul Reddy Nadikattu, " CONTENT ANALYSIS OF AMERICAN & INDIAN COMICS ON
INSTAGRAM USING MACHINE LEARNING", International Journal of Creative Research Thoughts
(IJCRT), ISSN:2320-2882, Volume.2, Issue 3, pp.86-103, September 2014

5. http://doi.one/10.1729/Journal.24194

6. Cobb, S., & Lee, A. (2014, June). Malware is called malicious for a reason: The risks of weaponizing
code. In 2014 6th International Conference On Cyber Conflict (CyCon 2014) (pp. 71-84). IEEE.

7. Rahul Reddy Nadikattu, "FUNDAMENTAL APPLICATIONS OF MACHINE LEARNING


ACROSS THE GLOBE", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-
2882, Volume.6, Issue 1, pp.31-40, January 2018

8. http://doi.one/10.1729/Journal.24133

9. Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks:
Phishing attack. In 2016 international conference on computing, communication and automation
(ICCCA) (pp. 537-540). IEEE.

10. Korb, K. B. (2014). Introduction: Machine learning as philosophy of science. Minds and Machines,
14(4), 433-440.
www.iejrd.com 6
Vol.3
International Engineering Journal For Research & Development Issue 1

11. Koval, N. (2015). Revolution hacking. Cyber war in perspective: Russian aggression against Ukraine,
55-58.

12. Marchal, S., François, J., State, R., & Engel, T. (2014, November). PhishScore: Hacking phishers'
minds. In 10th International Conference on Network and Service Management (CNSM) and Workshop
(pp. 46-54). IEEE.

13. Michie, D., Spiegelhalter, D. J., & Taylor, C. C. (2012). Machine learning. Neural and Statistical
Classification, 13.

14. Mirkovic, J., Prier, G., & Reiher, P. (2002, November). Attacking DDoS at the source. In 10th IEEE
International Conference on Network Protocols, 2002. Proceedings. (pp. 312-321). IEEE.

15. Mitchell, T. M. (2006). The discipline of machine learning (Vol. 9). Pittsburgh, PA: Carnegie Mellon
University, School of Computer Science, Machine Learning Department.

16. Rodriguez, C., & Martinez, R. (2012). The Growing Hacking Threat to Websites: An Ongoing
Commitment to Web Application Security. A Frost & Sullivan White Paper; Frost and Sullivan: San
Antonio, TX, USA.

17. Seufert, S., & O'Brien, D. (2012, June). Machine learning for automatic defence against distributed
denial of service attacks. In 2007 IEEE International Conference on Communications (pp. 1217-1222).
IEEE.

18. Stamp, M. (2017). Introduction to machine learning with applications in information security.
Chapman and Hall/CRC.

19. Tal, Y., & Miron, N. (2012). U.S. Patent Application No. 13/481,964.

www.iejrd.com 7

View publication stats

You might also like