๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Data mining techniques for information security applications

โœ Scribed by Amany Al-Shawi


Publisher
Wiley (John Wiley & Sons)
Year
2011
Tongue
English
Weight
339 KB
Volume
3
Category
Article
ISSN
0163-1829

No coin nor oath required. For personal study only.

โœฆ Synopsis


Abstract

Information security technology is an essential component for protecting public and private computing infrastructures. With the widespread utilization of information technology applications, organizations are becoming more aware of the security threats to their resources. No matter how strict the security policies and mechanisms are, more organizations are becoming susceptible to a wide range of security breaches against their electronic resources. Networkโ€intrusion detection is an essential defense mechanism against security threats, which have been increasing in rate lately. It is defined as a special form of cyber threat analysis to identify malicious actions that could affect the integrity, confidentiality, and availability of information resources. Data miningโ€based intrusionโ€detection mechanisms are extremely useful in discovering security breaches. This article will provide an overview of the applications of data mining techniques in the information security domain. The focus will be on applying data mining to intrusion detection and intrusion prevention. This article will present a critical overview of the research directions in these fields, which will help researchers identify the key practical and research issues essential for building a successful networkโ€protection system. WIREs Comp Stat 2011 3 221โ€“229 DOI: 10.1002/wics.161

This article is categorized under:

Statistical and Graphical Methods of Data Analysis > Data Reduction, Smoothing, and Filtering

Algorithms and Computational Methods > Networks and Security

Statistical Learning and Exploratory Methods of the Data Sciences > Text Mining


๐Ÿ“œ SIMILAR VOLUMES


DB-HReduction: A data preprocessing algo
โœ Xiaohua Hu ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 574 KB

## Data preprocessing is an important and critical step in the data mining process and it has a huge impact on the SUCCESS of a data mining project. In this paper, we present an algorithm DB-HFkduction, which discretiaes or eliminates numeric attributes and generalizes or eliminates symbolic attr

Probabilistic and fuzzy methods for info
โœ N. J. Randon; J. Lawry ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 390 KB

With the wealth of information available in the world today the challenge of how to extract information from several data sources in an intuitive and transparent manner has emerged in machine learning. This article describes a method for learning models from a database using linguistic descriptions

Development of New Models for Geomechani
โœ Tiago Miranda; Antรณnio Gomes Correia; Luรญs Ribeiro e Sousa ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Wiley (John Wiley & Sons) ๐ŸŒ English โš– 988 KB

## Abstract The evaluation of geomechanical parameters for rock masses is one of the issues with largest uncertainty degree. This is mostly true in the preliminary stages of design and in small works where geotechnical information is normally scarce. In these cases, geotechnical data from past proj