Analyzing Information Security Issues Using Data Mining Techniques

被引:0
|
作者
Schiopu, Daniela [1 ]
Tudor, Irina [1 ]
机构
[1] Petr Gas Univ Ploiesti, Ploiesti 100680, Romania
关键词
information security; vulnerability; data mining; decision tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The field of information security has grown and developed significantly in recent years. Its concerns are: the confidentiality, integrity and availability of data with different presentation form (electronic, print, or other forms of information). Data mining can be applied to find relevant computer security information. In his paper we present data mining techniques used for intrusion detection. Data provided by National Vulnerability Database site represents the basic for our application and our goal is to demonstrate that we can identify appropriate and accurate classifiers to detect anomalies mediated by data mining methods. Association rules, decision trees and other classification methods represent an effective manner for cur target. The authors aim to determine the appeared issue and to solve the information security vulnerabilities.
引用
收藏
页码:215 / 222
页数:8
相关论文
共 50 条
  • [1] Data mining techniques for information security applications
    Al-Shawi, Amany
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
  • [2] Analyzing the impact of information technology investments using regression and data mining techniques
    Ko, Myung
    Osei-Bryson, Kweku-Muata
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2006, 19 (04) : 403 - +
  • [3] Using data mining techniques to explore security issues in smart living environments in Twitter
    Ramon Saura, Jose
    Palacios-Marques, Daniel
    Ribeiro-Soriano, Domingo
    [J]. COMPUTER COMMUNICATIONS, 2021, 179 : 285 - 295
  • [4] Analyzing Different Domains using Data Mining Techniques
    Mandan, Nelshan
    Agrawal, Kanika
    Kumar, Sunny
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 99 - 104
  • [5] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [6] Analyzing the real time electricity data using data mining techniques
    Aki, Aravindh
    Reddy, Krishna Mohan D.
    Reddy, Koushik Y.
    Kavitha, C. R.
    Sasikala, T.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 545 - 549
  • [7] A Survey on Analyzing Crime Patterns Using Data Mining Techniques
    Ahamed, S. Imthiyas
    Chockalingam, J.
    Khadir, A. Shaik Abdul
    [J]. JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (03) : 153 - 160
  • [8] Analyzing Teaching Performance of Instructors Using Data Mining Techniques
    Mardikyan, Sona
    Badur, Bertan
    [J]. INFORMATICS IN EDUCATION, 2011, 10 (02): : 245 - 257
  • [9] Analyzing Privacy and Security Issues in the Information Age
    Feng, Ji-Xuan
    Hughes, Janet
    [J]. CEA'09: PROCEEDINGS OF THE 3RD WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 220 - +
  • [10] Security issues for data warehousing and data mining
    Thuraisingham, BM
    [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 11 - 20