Open Access Open Access  Restricted Access Subscription Access

Techniques of Data Mining in Cyber Security for Safe and Reliable Applications

Kurde Suraj Vishnu, Supriya C Padwal

Abstract


Data mining is a process of extracting patterns from large amounts of data. Data and pattern extraction is done using some techniques of pattern matching and various reasoning techniques. Cyber security is an area of data security dealing with cyber-attacks. Cyber security protects data and network processes from cyber attackers and cyber terrorism. Cyber security plays vital role in information security. Data security from cyber-attacks is a challenging task nowadays. Rapid growth of the Internet has brought an exponential increase in types of cyber-attacks with high frequency off attacks. Cyber-attacks in various forms like access violation, unauthorized data access, phishing, DoS attack and many others. This paper presents techniques of data mining useful for cyber security to provide safe and reliable data transmission and data access in networking.


Full Text:

PDF

References


Bharati, M., & Ramageri, M. (2010). Data mining techniques and applications.Indian Journal of Computer Science and Engineering, India Vol. 1 No. 4 301-305, Vol. 1 No. 4 301-305

Tamilselvi, R., & Kalaiselvi, S. (2013). An overview of data mining techniques and applications. International Journal of Science and Research (IJSR), India Online ISSN, 2319-7064.

Reddy, G. N., & Reddy, G. J. (2014). A study of cyber security challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.

Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2020). A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommunication Systems, 1-16.

Hossain, S., Sarma, D., & Chakma, R. J. (2020). Machine Learning-Based Phishing Attack Detection. Machine Learning, 11(9).

Wu, Y., Wei, D., & Feng, J. (2020). Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey. Security and Communication Networks, 2020.

Kim, A., Oh, J., Ryu, J., & Lee, K. (2020). A review of insider threat detection approaches with IoT perspective. IEEE Access, 8, 78847-78867.

Oña, D., Zapata, L., Fuertes, W., Rodríguez, G., Benavides, E., & Toulkeridis, T. (2019, October). Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods. In 2019 3rd Cyber Security in Networking Conference (CSNet) (pp. 161-163). IEEE.

https://www.upgrad.com/blog/data-mining-techniques/#4_Other_types_of_data

https://electricalfundablog.com/data-mining-working-characteristics-types-applications-advantages/#Types_of_Data_Mining


Refbacks

  • There are currently no refbacks.