Analyzing Information Security Issues Using Data Mining Techniques

被引:0
|
作者
Schiopu, Daniela [1 ]
Tudor, Irina [1 ]
机构
[1] Petr Gas Univ Ploiesti, Ploiesti 100680, Romania
关键词
information security; vulnerability; data mining; decision tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The field of information security has grown and developed significantly in recent years. Its concerns are: the confidentiality, integrity and availability of data with different presentation form (electronic, print, or other forms of information). Data mining can be applied to find relevant computer security information. In his paper we present data mining techniques used for intrusion detection. Data provided by National Vulnerability Database site represents the basic for our application and our goal is to demonstrate that we can identify appropriate and accurate classifiers to detect anomalies mediated by data mining methods. Association rules, decision trees and other classification methods represent an effective manner for cur target. The authors aim to determine the appeared issue and to solve the information security vulnerabilities.
引用
收藏
页码:215 / 222
页数:8
相关论文
共 50 条
  • [41] Using Opinion Mining Techniques on Twitter Streaming Data Regards Drug Safety Issues
    Alharbi, Abeer Nafel
    Alnamlah, Hessah
    Syed, Liyakathunsia
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [42] The Study on Privacy Preserving Data Mining for Information Security
    Li Xiaohui
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [43] Research on network and information security based on data mining
    Academy of Armored Forces Engineering, Beijing 100072, China
    不详
    Lect. Notes Electr. Eng., VOL. 4 (597-603):
  • [44] Information Security Monitoring System based on Data Mining
    Lv Guangjuan
    Xu Ruzhi
    Zu Xiangrong
    Deng Liwu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 472 - 475
  • [45] Exploring protein functional relationships using genomic information and data mining techniques
    Yang, JY
    Yang, MQ
    Ersoy, OK
    ARTIFICAIL NEURAL NETWORKS AND NEURAL INFORMATION PROCESSING - ICAN/ICONIP 2003, 2003, 2714 : 1073 - 1080
  • [46] Predicting return donor and analyzing blood donation time series using data mining techniques
    Alkahtani A.S.
    Jilani M.
    International Journal of Advanced Computer Science and Applications, 2019, 10 (08): : 113 - 118
  • [47] Predicting Return Donor and Analyzing Blood Donation Time Series using Data Mining Techniques
    Alkahtani, Anfal Saad
    Jilani, Musfira
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 113 - 118
  • [48] Overview of Data Security Issues in Hospital Information Systems
    Masrom, Maslin
    Rahimly, Ailar
    PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2015, 7 (04): : 51 - 65
  • [49] Big Data and the Web Discovering Meaningful Information from Web Data using Data Mining Techniques
    Abd Wahab, Mohd Helmy
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [50] Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques
    Alosaimi, Wael
    Alharbi, Abdullah
    Alyami, Hashem
    Alouffi, Bader
    Almulihi, Ahmed
    Nadeem, Mohd
    Kumar, Rajeev
    Agrawal, Alka
    AIMS MATHEMATICS, 2024, 9 (03): : 7017 - 7039