Data Mining and Its Cyber Security

被引:0
|
作者
Qiang, Xinjian [1 ]
Cheng, Guojian [1 ]
Xiao, Hong [1 ]
机构
[1] Xian Shiyou Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
关键词
Data mining; Artificial neural network; Support vector machines; Association rule mining; Image mining; Cyber security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining techniques are being investigated to find out who the suspicious people are and who is capable of carrying out terrorist activities. Cyber security is concerned with protecting the computer and network systems against corruption due to Trojan horses and viruses. In this paper, firstly, data mining and cyber security are briefly introduced. Some classic data mining techniques utilized in the development are then introduced, such as the Markov model, SVMs, ANNs, ARM, the problem of classification, and image classification, which is an aspect of image mining. Thirdly, data mining for cyber security applications, such as cyber terrorism, malicious Intrusions, credit card fraud and identity theft, attacks on critical infrastructures, are outlined in detail. Finally, current research and development is reviewed. Some conclusions are given at the end of the paper.
引用
下载
收藏
页码:218 / 221
页数:4
相关论文
共 50 条
  • [1] Data mining and Cyber security
    Thuraisingham, B
    THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2
  • [2] A Data Mining Framework to Predict Cyber Attack for Cyber Security
    Rahman, Md Anisur
    Al-Saggaf, Yeslam
    Zia, Tanveer
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 207 - 212
  • [3] Massive Data Mining, Cyber Security Approach
    Guizani, Sghaier
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 1368 - 1372
  • [4] Cyber Security Situation Awareness Based on Data Mining
    Liu Jie
    Feng Xuewei
    Li Jin
    Wang Dongxia
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 254 - 258
  • [5] Integrating fuzzy logic and data mining: Impact on Cyber Security
    Ansari, A. Q.
    Patki, Tapasya
    Patki, A. B.
    Kumar, V.
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2007, : 498 - +
  • [6] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [7] Data Mining for Security Applications and Its Privacy Implications
    Thuraisingham, Bhavani
    PRIVACY, SECURITY, AND TRUST IN KDD, 2009, 5456 : 1 - 6
  • [8] CYBER SECURITY AND DATA VISUALISATION
    Azvine, Ben
    Ghanea-Hercack, Robert
    JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2016, 10 : 9 - 13
  • [9] Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods
    Nath, Bhagawan
    Hamaleinen, Timo
    Ezekiel, Soundararajan
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 591 - 598
  • [10] A Novel Approach to Improve Robustness of Data Mining Models Used in Cyber Security Applications
    Cao, Ning
    Wang, Yingying
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 297 - 300