Analyzing Information Security Issues Using Data Mining Techniques

被引:0
|
作者
Schiopu, Daniela [1 ]
Tudor, Irina [1 ]
机构
[1] Petr Gas Univ Ploiesti, Ploiesti 100680, Romania
关键词
information security; vulnerability; data mining; decision tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The field of information security has grown and developed significantly in recent years. Its concerns are: the confidentiality, integrity and availability of data with different presentation form (electronic, print, or other forms of information). Data mining can be applied to find relevant computer security information. In his paper we present data mining techniques used for intrusion detection. Data provided by National Vulnerability Database site represents the basic for our application and our goal is to demonstrate that we can identify appropriate and accurate classifiers to detect anomalies mediated by data mining methods. Association rules, decision trees and other classification methods represent an effective manner for cur target. The authors aim to determine the appeared issue and to solve the information security vulnerabilities.
引用
收藏
页码:215 / 222
页数:8
相关论文
共 50 条
  • [1] Data mining techniques for information security applications
    Al-Shawi, Amany
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
  • [2] Analyzing the impact of information technology investments using regression and data mining techniques
    Ko, Myung
    Osei-Bryson, Kweku-Muata
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2006, 19 (04) : 403 - +
  • [3] Using data mining techniques to explore security issues in smart living environments in Twitter
    Ramon Saura, Jose
    Palacios-Marques, Daniel
    Ribeiro-Soriano, Domingo
    COMPUTER COMMUNICATIONS, 2021, 179 : 285 - 295
  • [4] Analyzing Different Domains using Data Mining Techniques
    Mandan, Nelshan
    Agrawal, Kanika
    Kumar, Sunny
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 99 - 104
  • [5] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [6] Analyzing the real time electricity data using data mining techniques
    Aki, Aravindh
    Reddy, Krishna Mohan D.
    Reddy, Koushik Y.
    Kavitha, C. R.
    Sasikala, T.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 545 - 549
  • [7] Analyzing Privacy and Security Issues in the Information Age
    Feng, Ji-Xuan
    Hughes, Janet
    CEA'09: PROCEEDINGS OF THE 3RD WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 220 - +
  • [8] A Survey on Analyzing Crime Patterns Using Data Mining Techniques
    Ahamed, S. Imthiyas
    Chockalingam, J.
    Khadir, A. Shaik Abdul
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (03) : 153 - 160
  • [9] Analyzing Teaching Performance of Instructors Using Data Mining Techniques
    Mardikyan, Sona
    Badur, Bertan
    INFORMATICS IN EDUCATION, 2011, 10 (02): : 245 - 257
  • [10] Security issues for data warehousing and data mining
    Thuraisingham, BM
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 11 - 20