Data Mining Technology Applied in Network Security

Article Preview

Abstract:

As the Internet is developing fast, network security issues are rising. Data mining technology is applied to the analysis and understanding data, revealing hidden data secret inside knowledge. Especially high dimensional data mining can be used in information security data analyze, making the study of high-dimensional data mining very important. In this paper, traditional data mining is introduced; the concept and core ideas of high dimensional data mining are described, as well as its applications in network security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4974-4979

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook, p.803–808. Springer (2010).

Google Scholar

[2] Muazzam Ahmed Siddiqui. Data Mining Methods for Malware Detection[D]. University of Central Florida, (2008).

Google Scholar

[3] L. Parsons, E. Haque and H. Liu. Subspace Clustering for High Dimensional Data: A Review[J]. ACM SIGKDD Explorations Newsletter, 2004, 6(l): 90•105.

DOI: 10.1145/1007730.1007731

Google Scholar

[4] F. Sebastiani. Text Categorization [J]. ACM Computing surveys, 2002, 34(1): 1-47.

Google Scholar

[5] Julisch K. Data mining for intrusion detection: A critical review. IBM Research, Zurich Research Laboratory.

Google Scholar

[6] Cai Y, Clutter D, Pape G, et al. MAID: mining alarming incidents from Data Streams. ACM-SIGMOD Int Conf Management of Data (SIGMOD04), New York: ACM Press, 2004, 919-920.

DOI: 10.1145/1007568.1007695

Google Scholar

[7] N. Wu, L. Shi and Q. Jiang. An Outlier Mining-Based Method for Anomaly Detection [C]. Proceeding of 2007 IEEE Intenational workshop on anti-counterfeiting Security, Identification, 2007, PP. 52-156.

DOI: 10.1109/iwasid.2007.373717

Google Scholar