A Study on Data Mining Techniques for Cyber Security
Creators
Description
Cyber security is that the world that deals with protecting from cyber terrorism. Cyber-attacks
include access control violations unauthorized intrusions and denial of service also as insider
threat. Security of a data or information system is its vital property especially today when
computers are interconnected via internet. Because no system is often absolutely secure the timely
and accurate detection of intrusions is important. For this purpose, Intrusion Detection Systems
were designed. The IDS together with data processing can provide the safety with next level data
processing is that the process of posing queries and extracting patterns, often previously unknown
from large quantities of data using pattern matching or other reasoning techniques. This Paper
gives the over view of the various data processing techniques which may be utilized in Cyber
security for intrusion detection.
Files
DataMining.pdf
Files
(337.6 kB)
Name | Size | Download all |
---|---|---|
md5:f1c48d3b6b7681b5c6549c10dab15361
|
337.6 kB | Preview Download |