Security for Data Mining

Provided by: Creative Commons
Topic: Security
Format: PDF
Ensuring the integrity of computer networks, both in relation to security and with regard to the institutional life of the nation in general, is a growing concern. In this paper, the authors discuss various data mining techniques that they have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. Data mining-based intrusion-detection mechanisms are extremely useful in discovering security breaches.

Find By Topic