Title :
Data Mining for Security Applications
Author :
Thuraisingham, Bhavani ; Khan, Latifur ; Masud, Mohammad M. ; Hamlen, Kevin W.
Author_Institution :
Univ. of Texas at Dallas, Dallas, TX
Abstract :
In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
Keywords :
data mining; security of data; anomaly detection; association rule mining; binary executable mining; cyber security; data mining; data stream mining; link analysis; malicious code detection; network intrusion detection; network traffic mining; security application; Application software; Computer hacking; Computer networks; Computer security; Computer viruses; Data mining; Data security; Intrusion detection; National security; Terrorism; data mining; intrusion detection; security;
Conference_Titel :
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3492-3
DOI :
10.1109/EUC.2008.62