Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

Author:

Al Quhtani Masoud1

Affiliation:

1. Embassy of the Kingdom of Saudi Arabia in Bosnia and Herzegovina, Sarajevo , Bosnia and Herzegovina

Abstract

Abstract Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

Publisher

Walter de Gruyter GmbH

Subject

Management of Technology and Innovation,Economics, Econometrics and Finance (miscellaneous),Information Systems,Management Information Systems

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Realization of knowledge service and management system based on data mining technology;6th International Workshop on Advanced Algorithms and Control Engineering (IWAACE 2022);2022-10-20

2. Real-Time Behavioral Biometric Information Security System for Assessment Fraud Detection;2021 IEEE International Conference on Computing (ICOCO);2021-11-17

3. Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices;Research Anthology on Combating Denial-of-Service Attacks;2021

4. An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks;International Journal of E-Services and Mobile Applications;2020-07

5. Phishing Attack Detection using a Search Engine and Heuristics-based Technique;Journal of Information Technology Research;2020-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3