DocumentCode
2372092
Title
Data mining for security applications
Author
Thuraisingham, B.
Author_Institution
The University of Texas at Dallas, Richardson, TX
fYear
2004
fDate
16-18 Dec. 2004
Firstpage
3
Lastpage
4
Abstract
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Cyber security is the area that deals with cyber terrorism. We are hearing that cyber attacks will cause corporations billions of dollars. For example, one could masquerade as a legitimate user and swindle say a bank of billions of dollars. Data mining and web mining may be used to detect and possibly prevent security attacks including cyber attacks. For example, anomaly detection techniques could be used to detect unusual patterns and behaviors. Link analysis may be used to trace the viruses to the perpetrators. Classification may be used to group various cyber attacks and then use the profiles to detect an attack when it occurs. Prediction may be used to determine potential future attacks depending in a way on information learnt about terrorists through email and phone conversations. Also, for some threats non real-time data mining may suffice while for certain other threats such as for network intrusions we may need real-time data mining. Many researchers are investigating the use of data mining for intrusion detection. While we need some form of real-time data mining, that is, the results have to be generated in real-time, we also need to build models in real-time. For example, credit card fraud detection is a form of real-time processing. However, here models are built ahead of time. Building models in real-time remains a challenge. Data mining can also be used for analyzing web logs as well as analyzing the audit trails. Based on the results of the data mining tool, one can then determine whether any unauthorized intrusions have occurred and/or whether any unauthorized queries have been posed. There has been much research on data mining for intrusion detection. Data mining may also be applied for Biometrics related applications. Finally data mining has applications in national securi- y including detecting and preventing terrorist activities. The presentation will provide an overview of data mining and security threats and then discuss the applications of data mining for cyber security and national security including in intrusion detection and biometrics. Privacy considerations including a discussion of privacy preserving data mining will also be given.
Keywords
Computer security; Data mining; Data privacy; Data security; Databases; Information management; Information security; Intrusion detection; National security; Terrorism;
fLanguage
English
Publisher
ieee
Conference_Titel
Machine Learning and Applications, 2004. Proceedings. 2004 International Conference on
Conference_Location
Louisville, Kentucky, USA
Print_ISBN
0-7803-8823-2
Type
conf
DOI
10.1109/ICMLA.2004.1383486
Filename
1383486
Link To Document