DocumentCode :
2410896
Title :
Data Mining for Security Applications
Author :
Thuraisingham, Bhavani ; Khan, Latifur ; Masud, Mohammad M. ; Hamlen, Kevin W.
Author_Institution :
Univ. of Texas at Dallas, Dallas, TX
Volume :
2
fYear :
2008
fDate :
17-20 Dec. 2008
Firstpage :
585
Lastpage :
589
Abstract :
In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
Keywords :
data mining; security of data; anomaly detection; association rule mining; binary executable mining; cyber security; data mining; data stream mining; link analysis; malicious code detection; network intrusion detection; network traffic mining; security application; Application software; Computer hacking; Computer networks; Computer security; Computer viruses; Data mining; Data security; Intrusion detection; National security; Terrorism; data mining; intrusion detection; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3492-3
Type :
conf
DOI :
10.1109/EUC.2008.62
Filename :
4755289
Link To Document :
بازگشت