Data Mining and Its Cyber Security

被引:0
|
作者
Qiang, Xinjian [1 ]
Cheng, Guojian [1 ]
Xiao, Hong [1 ]
机构
[1] Xian Shiyou Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
关键词
Data mining; Artificial neural network; Support vector machines; Association rule mining; Image mining; Cyber security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining techniques are being investigated to find out who the suspicious people are and who is capable of carrying out terrorist activities. Cyber security is concerned with protecting the computer and network systems against corruption due to Trojan horses and viruses. In this paper, firstly, data mining and cyber security are briefly introduced. Some classic data mining techniques utilized in the development are then introduced, such as the Markov model, SVMs, ANNs, ARM, the problem of classification, and image classification, which is an aspect of image mining. Thirdly, data mining for cyber security applications, such as cyber terrorism, malicious Intrusions, credit card fraud and identity theft, attacks on critical infrastructures, are outlined in detail. Finally, current research and development is reviewed. Some conclusions are given at the end of the paper.
引用
收藏
页码:218 / 221
页数:4
相关论文
共 50 条
  • [21] ChainSpot: Mining Service Logs for Cyber Security Threat Detection
    Wu, Jain-Shing
    Lee, Yuh-Jye
    Wei, Te-En
    Hsieh, Chih-Hung
    Lai, Chia-Min
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1867 - 1874
  • [22] On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts
    Husak, Martin
    Kaspar, Jaroslav
    Bou-Harb, Elias
    Celeda, Pavel
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [23] Data Mining in Cyber, Physical, and Social Computing
    Liu, Jun
    Yan, Zheng
    Vasilakos, Athanasios V.
    Yang, Laurence T.
    IEEE SYSTEMS JOURNAL, 2017, 11 (01): : 194 - 196
  • [24] Applying Data Mining Techniques in Cyber Crimes
    Khan, Mohiuddin Ali
    Pradhan, Sateesh Kumar
    Fatima, Huda
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 213 - 216
  • [25] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [26] Detecting Periodic Subsequences in Cyber Security Data
    Price-Williams, Matthew
    Heard, Nick
    Turcotte, Melissa
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 84 - 90
  • [27] Redefining Cyber Security with Big Data Analytics
    Apurva, Aviral
    Ranakoti, Pranshu
    Yadav, Saurav
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 199 - 203
  • [28] Cyber Security Automation for Controlling Distributed Data
    Deore, Ujjwala D.
    Waghmare, Vijaya
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [29] Privacy Principles for Sharing Cyber Security Data
    Fisk, Gina
    Ardi, Calvin
    Pickett, Neale
    Heidemann, John
    Fisk, Mike
    Papadopoulos, Christos
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 193 - 197
  • [30] DATA AND CYBER SECURITY IN AUTONOMOUS VEHICLE NETWORKS
    Raiyn, Jamal
    TRANSPORT AND TELECOMMUNICATION JOURNAL, 2018, 19 (04) : 325 - 334