Download Applications of Data Mining in Computer Security by Steven Noel, Duminda Wijesekera (auth.), Daniel Barbará, PDF

By Steven Noel, Duminda Wijesekera (auth.), Daniel Barbará, Sushil Jajodia (eds.)

Data mining is changing into a pervasive know-how in actions as various as utilizing old facts to foretell the luck of a campaign, searching for styles in monetary transactions to find unlawful actions or reading genome sequences. From this attitude, it was once only a subject of time for the self-discipline to arrive the real sector of desktop safety. Applications of information Mining In computing device Security offers a suite of study efforts at the use of knowledge mining in laptop security.

Applications of information Mining In computing device Security concentrates seriously at the use of knowledge mining within the sector of intrusion detection. the cause of this can be twofold. First, the quantity of knowledge facing either community and host job is so huge that it makes it an incredible candidate for utilizing information mining thoughts. moment, intrusion detection is an exceptionally serious task. This e-book additionally addresses the appliance of knowledge mining to desktop forensics. it is a the most important quarter that seeks to deal with the desires of legislation enforcement in reading the electronic evidence.

Show description

Read or Download Applications of Data Mining in Computer Security PDF

Best mining books

Treadwell Gold: An Alaska Saga of Riches and Ruin

A century in the past, Treadwell, Alaska, was once a featured cease on steamship cruises, a wealthy, up to date city that was once the main fashionable and proud in all Alaska. Its wealth, notwithstanding, used to be based at the remarkably effective gold mines on Douglas Island, and whilst these caved in and flooded within the early many years of the 20th century, Treadwell sank into relative obscurity.

Enhanced Oil Recovery: Field Planning and Development Strategies

Enhanced-Oil restoration (EOR) reviews excited by asset acquisition or rejuvenation contain a mixture of complicated judgements, utilizing varied info resources. EOR initiatives were characteristically linked to excessive CAPEX and OPEX, in addition to excessive monetary possibility, which are inclined to restrict the variety of EOR initiatives introduced.

Data X Strategien: Data Warehouse, Data Mining und operationale Systeme für die Praxis

Auf der Grundlage aktueller Entwicklungen der Wirtschaftsinformatik stellen die Autoren Konzepte dar, die als Richtlinie für die künftige Entwicklung von einem die operationalen Systeme, facts Warehouse-, Informations-, Experten- und info Mining Systeme umfassenden Anwendungssystem dienen können. Neben notwendigen theoretischen Aspekten wird basierend auf der umfangreichen praktischen Erfahrung der Autoren in der Anwendungsentwicklung für Kreditinstitute ein konkreter Praxisbezug hergestellt.

Extra resources for Applications of Data Mining in Computer Security

Example text

In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX. , Stolfo, S. , and Mok, K. W. (1999). A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy. Lee, W. and Xiang, D. (2001). Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, pages 130143, Oakland, CA. IEEE Computer Society. Liepins, G. and Vaccaro, H. (1989). Anomaly detection purpose and framework. In 12th National Computer Security Co nference, pages 495-504, Baltimore, MD.

In other words, it detects attacks that involve a relatively large number of events within aperiod of time. This is because it sends an alarm only when the number of occurrences of an unexpected rule exceeds a threshold. This limitation is not unique to this approach; most of the anomaly detection models have the same problem (Ning, 2001). 6. Combining data mining and classification for anomaly detection A primary focus of research in anomaly detection is in detecting novel attacks while maintaining sufficiently low numbers of false alarms.

An intrusion-detection model. IEEE Transactions on Software Engineering, 13:222-232. Dowell, C. and Ramstedt, P. (1990). The computerwatch data reduction tool. In 13th National Computer Security Conference, Washington, DC . 27 Engelhardt, D. (1997). Directions for intrusion deteetion and response: A survey. Technical Report DSTO-GD-0155, DSTO Electronics and Surveillance Research Laboratory. , and Pieprzyk, J. (1996). Case-based reasoning for intrusion detection. In 12th Annual Computer Security Applications Conference, San Diego, CA .

Download PDF sample

Rated 4.49 of 5 – based on 11 votes