Data Mining for Security Applications
#1

1 Introduction
This is a summary of discussions at Workshop onData Mining for Security Applications CCS’01, PA.In this document data mining takes a broad meaningwhich may, sometimes, include machine learning(ML) and artificial intelligence (AI). Furthermore,forensics and intrusion detection are interchangeablein some contexts. Please note it is beyond the scopeof our discussions to provide better definitions tothese terms.It is noted in early discussions that most data miningsolutions avoid recognition of simple, effectivesubstitutes in place of sophisticated, computationallyintensive data mining techniques. One of thesuggestions is that future performance comparisonsshould include some of these simple, effective methodswhere appropriate. Also noted that most datamining techniques do not emphasize enough on preprocessingand post-processing of datasets. It wasemphasized that we should use machine learning techniquesto fine tune input datasets before data miningand should automate decision making after data mining.Authors demonstrated use of data mining forintrusion detection, for identifying denial of serviceattacks and for forensics.2 Questions...Traditionally data mining has solved problems indatabase systems and bio-informatics– where datamining techniques are still being used successfully tomap genome– and financial engineering. Recentlydata mining community started applying similartechniques to existing security problems. “This eventprovides an opportunity for attendees of the ACM_Feel free to edit this document but please let me knowwhat you did so that I can keep my copy fresh. Thanks!CCS to meet with researchers who are interested inapplying data mining techniques to security applicationsand discuss critical issues of mutual interestduring a concentrated period.
”Two fundamental questions were asked and mostlywent unanswered in our discussions.
1. Are we trying to solve the right security problem(s)?
Are denial of service and intrusion detectionright problems for data mining or are there anyother security problems where data mining couldbe more effective– such as cryptanalysis–, usefuland perhaps preventive? It was suggested forensicsis one of the fields that can use data miningfor effective data reduction and for learning newinsights or patterns. There were no other suggestions.
2. Do security problems need development of newdata mining techniques?It is hard to answer this question without answeringthe previous question. We have not yet identifiedsecurity problems that mandate a wholenew data mining approach. However, it was feltstrongly among the panel that new data miningtechniques will have to be investigated in nearfuture. One of the suggestions was to investigatetechniques used in bio-informatics to solve securityproblems– especially intrusion detection.3 Ideas & OpinionsFollowing is a collection of ideas and opinions thatcame out of this workshop. Most of them revolvearound security problems for which data mining canprovide solutions.


Download full report
http://googleurl?sa=t&source=web&cd=1&ve...ingsec.pdf&ei=HqBUTrPaPM_xrQe354jSDg&usg=AFQjCNEKgl9RJVfh2YHuxkYcTZOlBNNY0Q&sig2=7sbFEWJUAw7iKs_WSHiKCw
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: building data mining applications for crm, data mining applications, report for data mining applications for healthcare, data mining applications in military ppt, data mining applications project topics, data mining applications in sports, data mining web applications,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,062 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Cloud Computing with Service Oriented Architecture in Business Applications 1 890 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Migrating Component-based Web Applications to Web Services: towards considering a ”We 1 822 15-02-2017, 10:56 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 818 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 750 14-02-2017, 04:15 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,714 01-10-2016, 10:02 AM
Last Post: Guest
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,806 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,644 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,812 06-11-2015, 02:27 PM
Last Post: seminar report asees

Forum Jump: