scholarly journals Cyber Security Situation Awareness Based on Data Mining

Author(s):  
Jie Liu ◽  
Xuewei Feng ◽  
Jin Li ◽  
Dongxia Wang
2013 ◽  
Vol 756-759 ◽  
pp. 4336-4342
Author(s):  
Jie Liu ◽  
Xue Wei Feng ◽  
Jin Li ◽  
Dong Xia Wang

Situation awareness is a kind of the third generation of information security technology, which aims to provide the global security views of the cyberspace for administrators. A framework of cyber security situation awareness based on data mining is proposed in this paper. The framework can be viewed from two perspectives, one is data flow, which presents the abstracting of cyber data, and the other one is logic view, which presents the procedure of situation awareness. The frameworks core component is correlation state machine, which is an extension of state machine. The correlation state machine is a data structure of achieving situation awareness, which is created based on the technology of data mining. After being created, it can be used to assess and predict the threat situation to achieve cyber knowledge. We conclude with an example of how the framework can be applied to real world to provide cyber security situation for administrators.


2018 ◽  
pp. 1060-1092
Author(s):  
Hanaa. M. Said ◽  
Rania El Gohary ◽  
Mohamed Hamdy ◽  
Abdelbadeeh M. Salem

Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.


2011 ◽  
Vol 10 ◽  
pp. 1029-1034 ◽  
Author(s):  
Yan Zhang ◽  
Shuguang Huang ◽  
Shize Guo ◽  
Junmao Zhu

An interference discovery framework is customizing that screens a singular or an arrangement of PCs for toxic activities that are away for taking or blue-penciling information or spoiling framework shows. The most methodology used as a piece of the present interference recognition framework is not prepared to deal with the dynamic and complex nature of computerized attacks on PC frameworks. In spite of the way that compelling adaptable methodologies like various frameworks of AI can realize higher discovery rates, cut down bogus alert rates and reasonable estimation and correspondence cost. The use of data mining can realize ceaseless model mining, request, gathering and littler than ordinary data stream. This examination paper portrays a connected with composing audit of AI and data delving procedures for advanced examination in the assistance of interference discovery. In perspective on the number of references or the congruity of a rising methodology, papers addressing each procedure were recognized, examined, and compacted. Since data is so fundamental in AI and data mining draws near, some striking advanced educational records used as a piece of AI and data burrowing are depicted for computerized security is shown, and a couple of recommendations on when to use a given system are given.


Sign in / Sign up

Export Citation Format

Share Document