{"title":"网络安全的数据挖掘","authors":"Cr Ikemelu","doi":"10.4314/STECH.V3I3.10","DOIUrl":null,"url":null,"abstract":"Cyber security is concerned with protecting computer and network system from corruption due to malicious software including Trojan horses and virus. Security of our network system is becoming imperative as massive sensitive information is transmitted across the network. In this research paper, data mining application for cyber security is highly explored. We discussed various cyber-terrorism or attack committed across the network such as malicious intrusion, credit card fraud, identity thefts, and infrastructure attack. Data mining techniques such as classification, anomaly, link analysis and so on are being applied to detect or prevent the aforementioned cyber-terrorism or attack. Recommendations were made and suggestion for further study was indicated.","PeriodicalId":272760,"journal":{"name":"AFRREV STECH: An International Journal of Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Mining for Cyber Security\",\"authors\":\"Cr Ikemelu\",\"doi\":\"10.4314/STECH.V3I3.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber security is concerned with protecting computer and network system from corruption due to malicious software including Trojan horses and virus. Security of our network system is becoming imperative as massive sensitive information is transmitted across the network. In this research paper, data mining application for cyber security is highly explored. We discussed various cyber-terrorism or attack committed across the network such as malicious intrusion, credit card fraud, identity thefts, and infrastructure attack. Data mining techniques such as classification, anomaly, link analysis and so on are being applied to detect or prevent the aforementioned cyber-terrorism or attack. Recommendations were made and suggestion for further study was indicated.\",\"PeriodicalId\":272760,\"journal\":{\"name\":\"AFRREV STECH: An International Journal of Science and Technology\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AFRREV STECH: An International Journal of Science and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4314/STECH.V3I3.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AFRREV STECH: An International Journal of Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/STECH.V3I3.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber security is concerned with protecting computer and network system from corruption due to malicious software including Trojan horses and virus. Security of our network system is becoming imperative as massive sensitive information is transmitted across the network. In this research paper, data mining application for cyber security is highly explored. We discussed various cyber-terrorism or attack committed across the network such as malicious intrusion, credit card fraud, identity thefts, and infrastructure attack. Data mining techniques such as classification, anomaly, link analysis and so on are being applied to detect or prevent the aforementioned cyber-terrorism or attack. Recommendations were made and suggestion for further study was indicated.