Data Mining and Its Cyber Security

被引:0
|
作者
Qiang, Xinjian [1 ]
Cheng, Guojian [1 ]
Xiao, Hong [1 ]
机构
[1] Xian Shiyou Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
关键词
Data mining; Artificial neural network; Support vector machines; Association rule mining; Image mining; Cyber security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining techniques are being investigated to find out who the suspicious people are and who is capable of carrying out terrorist activities. Cyber security is concerned with protecting the computer and network systems against corruption due to Trojan horses and viruses. In this paper, firstly, data mining and cyber security are briefly introduced. Some classic data mining techniques utilized in the development are then introduced, such as the Markov model, SVMs, ANNs, ARM, the problem of classification, and image classification, which is an aspect of image mining. Thirdly, data mining for cyber security applications, such as cyber terrorism, malicious Intrusions, credit card fraud and identity theft, attacks on critical infrastructures, are outlined in detail. Finally, current research and development is reviewed. Some conclusions are given at the end of the paper.
引用
收藏
页码:218 / 221
页数:4
相关论文
共 50 条
  • [31] Big Data In computer Cyber Security Systems
    AlMadahkah, Amani Mobarak
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 56 - 65
  • [32] Cyber Security Through Multidimensional Data Decompositions
    Bruns-Smith, David
    Baskaran, Muthu M.
    Ezick, James
    Henretty, Tom
    Lethin, Richard
    2016 CYBERSECURITY SYMPOSIUM, 2016, : 59 - 67
  • [33] Cyber Assist Project and its security requirement
    Nakashima, H
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 2 - 5
  • [34] Security issues for data warehousing and data mining
    Thuraisingham, BM
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 11 - 20
  • [35] Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection
    Parraguez Kobek, Luisa
    Caldera, Erick
    OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24): : 109 - 128
  • [36] Data Fusion in Cyber Security: First Order Entity Extraction from Common Cyber Data
    Giacobe, Nicklaus A.
    CYBER SENSING 2012, 2012, 8408
  • [37] Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security
    Zimba, Aaron
    Wang, Zhaoshun
    Mulenga, Mwenge
    Odongo, Nickson Herbert
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (04) : 297 - 308
  • [38] Cyber Security: A New Approach of Secure Data Through Attentiveness in Cyber Space
    Parasuraman, Kumar
    Kumar, A. Anbarasa
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 103 - 115
  • [39] Security and Integrity in Outsourcing of Data Mining
    Cheung, David Wai-lok
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 1 - 1
  • [40] Semantic Web, Data Mining, and Security
    Thuraisingham, Bhavani
    Khan, Latifur
    Kantarcioglu, Murat
    IEEE INTELLIGENT SYSTEMS, 2010, 25 (05) : 86 - 88