scholarly journals Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery

Today’s age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both techniques play a significant role in measuring vulnerability prediction accuracy. In the field of computer security, vulnerability is a fault that might be exploited as a risk artist that performs unlawful activities inside computer security. The attackers have several different fitting tools and they are taking advantage to operate software illegally and are using it for getting self-profit. Additionally, that helps to expose and identify the violence external. Weakness management remains a repeating exercise to identify, remediating, and justifying weaknesses. These exercises normally send software faults in computing security. The meaning of using weakness with the same risk might go to misperception. It is possible to have a major effect because of possible stability and the window of weakness presented a risk hole in the software and required to fruitfully finish and smoothly operate. A security room has to be set up (zero-day invaders). Software Security Faults stand serious among unavoidable complications in the realm of computer risk. In this study, we have provided a comprehensive review of three book chapters, more than a hundred research articles papers, and several associated papers of different work that have been studied within the capacity of SVA and discovery applying ML and data-mining techniques. The earlier work has been thoroughly read and an adequately comprehensive summary has been provided in table-1. ML techniques that can professionally handle these attacks and we expect the net result of this survey article to help indesigning the new detection model for identifying the above-mentioned attacks

2019 ◽  
Vol 15 (2) ◽  
pp. 275-280
Author(s):  
Agus Setiyono ◽  
Hilman F Pardede

It is now common for a cellphone to receive spam messages. Great number of received messages making it difficult for human to classify those messages to Spam or no Spam.  One way to overcome this problem is to use Data Mining for automatic classifications. In this paper, we investigate various data mining techniques, named Support Vector Machine, Multinomial Naïve Bayes and Decision Tree for automatic spam detection. Our experimental results show that Support Vector Machine algorithm is the best algorithm over three evaluated algorithms. Support Vector Machine achieves 98.33%, while Multinomial Naïve Bayes achieves 98.13% and Decision Tree is at 97.10 % accuracy.


2019 ◽  
Vol 1 (1) ◽  
pp. 121-131
Author(s):  
Ali Fauzi

The existence of big data of Indonesian FDI (foreign direct investment)/ CDI (capital direct investment) has not been exploited somehow to give further ideas and decision making basis. Example of data exploitation by data mining techniques are for clustering/labeling using K-Mean and classification/prediction using Naïve Bayesian of such DCI categories. One of DCI form is the ‘Quick-Wins’, a.k.a. ‘Low-Hanging-Fruits’ Direct Capital Investment (DCI), or named shortly as QWDI. Despite its mentioned unfavorable factors, i.e. exploitation of natural resources, low added-value creation, low skill-low wages employment, environmental impacts, etc., QWDI , to have great contribution for quick and high job creation, export market penetration and advancement of technology potential. By using some basic data mining techniques as complements to usual statistical/query analysis, or analysis by similar studies or researches, this study has been intended to enable government planners, starting-up companies or financial institutions for further CDI development. The idea of business intelligence orientation and knowledge generation scenarios is also one of precious basis. At its turn, Information and Communication Technology (ICT)’s enablement will have strategic role for Indonesian enterprises growth and as a fundamental for ‘knowledge based economy’ in Indonesia.


Author(s):  
S. K. Saravanan ◽  
G. N. K. Suresh Babu

In contemporary days the more secured data transfer occurs almost through internet. At same duration the risk also augments in secure data transfer. Having the rise and also light progressiveness in e – commerce, the usage of credit card (CC) online transactions has been also dramatically augmenting. The CC (credit card) usage for a safety balance transfer has been a time requirement. Credit-card fraud finding is the most significant thing like fraudsters that are augmenting every day. The intention of this survey has been assaying regarding the issues associated with credit card deception behavior utilizing data-mining methodologies. Data mining has been a clear procedure which takes data like input and also proffers throughput in the models forms or patterns forms. This investigation is very beneficial for any credit card supplier for choosing a suitable solution for their issue and for the researchers for having a comprehensive assessment of the literature in this field.


Author(s):  
Jean Claude Turiho ◽  
◽  
Wilson Cheruiyot ◽  
Anne Kibe ◽  
Irénée Mungwarakarama ◽  
...  

Author(s):  
Sujata Mulik

Agriculture sector in India is facing rigorous problem to maximize crop productivity. More than 60 percent of the crop still depends on climatic factors like rainfall, temperature, humidity. This paper discusses the use of various Data Mining applications in agriculture sector. Data Mining is used to solve various problems in agriculture sector. It can be used it to solve yield prediction.  The problem of yield prediction is a major problem that remains to be solved based on available data. Data mining techniques are the better choices for this purpose. Different Data Mining techniques are used and evaluated in agriculture for estimating the future year's crop production. In this paper we have focused on predicting crop yield productivity of kharif & Rabi Crops. 


Author(s):  
Tushar Deshmukh ◽  
H. S. Fadewar

This Diabetes is such a common dieses found all over the globe, in which blood glucose or in normal terminology the sugar level in blood is increased. It is the condition of the body in which the insulin which is required for the metabolism of the food is not created or body cannot use the insulin produced properly. Doctors say that diabetes can be controlled if it is detected in its early stages. Data mining is the process in which the data can be used for the prediction based on historic data. The intention here is to analysis how various researchers have used the data mining for better prediction of diabetes so that it could be controlled and possible even cured.


Author(s):  
Khalid AA Abakar ◽  
Chongwen Yu

This work demonstrated the possibility of using the data mining techniques such as artificial neural networks (ANN) and support vector machine (SVM) based model to predict the quality of the spinning yarn parameters. Three different kernel functions were used as SVM kernel functions which are Polynomial and Radial Basis Function (RBF) and Pearson VII Function-based Universal Kernel (PUK) and ANN model were used as data mining techniques to predict yarn properties. In this paper, it was found that the SVM model based on Person VII kernel function (PUK) have the same performance in prediction of spinning yarn quality in comparison with SVM based RBF kernel. The comparison with the ANN model showed that the two SVM models give a better prediction performance than an ANN model.


Sign in / Sign up

Export Citation Format

Share Document