Analyzing Information Security Issues Using Data Mining Techniques

被引:0
|
作者
Schiopu, Daniela [1 ]
Tudor, Irina [1 ]
机构
[1] Petr Gas Univ Ploiesti, Ploiesti 100680, Romania
来源
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON VIRTUAL LEARNING | 2008年
关键词
information security; vulnerability; data mining; decision tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The field of information security has grown and developed significantly in recent years. Its concerns are: the confidentiality, integrity and availability of data with different presentation form (electronic, print, or other forms of information). Data mining can be applied to find relevant computer security information. In his paper we present data mining techniques used for intrusion detection. Data provided by National Vulnerability Database site represents the basic for our application and our goal is to demonstrate that we can identify appropriate and accurate classifiers to detect anomalies mediated by data mining methods. Association rules, decision trees and other classification methods represent an effective manner for cur target. The authors aim to determine the appeared issue and to solve the information security vulnerabilities.
引用
收藏
页码:215 / 222
页数:8
相关论文
共 50 条
  • [21] Analyzing privacy and security issues in the information age - An ethical perspective
    Feng, Ji-Xuan
    Hughes, Janet
    WSEAS Transactions on Information Science and Applications, 2009, 6 (01): : 126 - 135
  • [22] Information Security in Big Data: Privacy and Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Wang, Jian
    Yuan, Jian
    Ren, Yong
    IEEE ACCESS, 2014, 2 : 1149 - 1176
  • [23] Design of A Data Warehouse for Medical Information System Using Data Mining Techniques
    Farooqui, Nafees Akhter
    Mehra, Ritika
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 199 - 203
  • [24] Analysis of Security Techniques and Issues in Data Warehouse
    Phoghat, Parul
    Maitrey, Seema
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 936 - 940
  • [25] Data mining techniques for analyzing stroke care processes
    Panzarasa, Silvia
    Quaglini, Silvana
    Sacchi, Lucia
    Cavallini, Anna
    Micieli, Giuseppe
    Stefanelli, Mario
    MEDINFO 2010, PTS I AND II, 2010, 160 : 939 - 943
  • [26] Data mining techniques for analyzing bank customers: A survey
    Hasheminejad, Seyed Mohammad Hossein
    Khorrami, Mojgan
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2018, 12 (03): : 303 - 321
  • [27] A Survey of Data Mining Techniques for Analyzing Crime Patterns
    Thongsatapornwatana, Ubon
    2016 SECOND ASIAN CONFERENCE ON DEFENCE TECHNOLOGY (ACDT), 2016, : 123 - 128
  • [28] Critical Review on Privacy and Security Issues in Data Mining
    Babu, Pasupuleti Nagendra
    Ramakrishna, S.
    EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 217 - 230
  • [29] Analyzing security protocols using association rule mining
    Chen, QF
    Chen, YPP
    AI 2005: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2005, 3809 : 245 - 253
  • [30] Detecting misuse of information retrieval systems using data mining techniques
    Goharian, N
    Ma, L
    Meyers, C
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 604 - 605