Security in Data Mining- A Comprehensive Survey

Article ID

CSTSDEL8O88

Security in Data Mining- A Comprehensive Survey

Niranjan A
Niranjan A UVCE
Nitish A
Nitish A
P Deepa Shenoy
P Deepa Shenoy
Venugopal K R
Venugopal K R
DOI

Abstract

Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, introduce a number of privacy threats on the other hand. In this paper, we study some of these issues along with a detailed discussion on the applications of various data mining techniques for providing security. An efficient classification technique when used properly, would allow an user to differentiate between a phishing website and a normal website, to classify the users as normal users and criminals based on their activities on Social networks (Crime Profiling) and to prevent users from executing malicious codes by labelling them as malicious. The most important applications of Data mining is the detection of intrusions, where different Data mining techniques can be applied to effectively detect an intrusion and report in real time so that necessary actions are taken to thwart the attempts of the intruder. Privacy Preservation, Outlier Detection, Anomaly Detection and PhishingWebsite Classification are discussed in this paper.

Security in Data Mining- A Comprehensive Survey

Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, introduce a number of privacy threats on the other hand. In this paper, we study some of these issues along with a detailed discussion on the applications of various data mining techniques for providing security. An efficient classification technique when used properly, would allow an user to differentiate between a phishing website and a normal website, to classify the users as normal users and criminals based on their activities on Social networks (Crime Profiling) and to prevent users from executing malicious codes by labelling them as malicious. The most important applications of Data mining is the detection of intrusions, where different Data mining techniques can be applied to effectively detect an intrusion and report in real time so that necessary actions are taken to thwart the attempts of the intruder. Privacy Preservation, Outlier Detection, Anomaly Detection and PhishingWebsite Classification are discussed in this paper.

Niranjan A
Niranjan A UVCE
Nitish A
Nitish A
P Deepa Shenoy
P Deepa Shenoy
Venugopal K R
Venugopal K R

No Figures found in article.

Niranjan A. 2017. “. Global Journal of Computer Science and Technology – C: Software & Data Engineering GJCST-C Volume 16 (GJCST Volume 16 Issue C5): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 16 Issue C5
Pg. 51- 72
Classification
H.2.8
Keywords
Article Matrices
Total Views: 7137
Total Downloads: 1855
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security in Data Mining- A Comprehensive Survey

Niranjan A
Niranjan A UVCE
Nitish A
Nitish A
P Deepa Shenoy
P Deepa Shenoy
Venugopal K R
Venugopal K R

Research Journals