Security in Data Mining- A Comprehensive Survey

1
Niranjan A
Niranjan A
2
Nitish A
Nitish A
3
P Deepa Shenoy
P Deepa Shenoy
4
Venugopal K R
Venugopal K R
1 UVCE

Send Message

To: Author

GJCST Volume 16 Issue C5

Article Fingerprint

ReserarchID

CSTSDEL8O88

Security in Data Mining- A Comprehensive Survey Banner

AI TAKEAWAY

The objective of our study was to evaluate, in a population of Togolese People Living With HIV(PLWHIV), the agreement between three scores derived from the general population namely the Framingham score, the Systematic Coronary Risk Evaluation (SCORE), the evaluation of the cardiovascular risk (CVR) according to the World Health Organization.
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, introduce a number of privacy threats on the other hand. In this paper, we study some of these issues along with a detailed discussion on the applications of various data mining techniques for providing security. An efficient classification technique when used properly, would allow an user to differentiate between a phishing website and a normal website, to classify the users as normal users and criminals based on their activities on Social networks (Crime Profiling) and to prevent users from executing malicious codes by labelling them as malicious. The most important applications of Data mining is the detection of intrusions, where different Data mining techniques can be applied to effectively detect an intrusion and report in real time so that necessary actions are taken to thwart the attempts of the intruder.

Article content is being processed or not available yet.

147 Cites in Articles

References

  1. D Stinson (2006). Cryptography: Theory and Practice 3rd Edition.
  2. C.-H Yeh,G Lee,C.-Y Lin (2015). Robust Laser Speckle Authentication System through Data Mining Techniques.
  3. S Khan,A Sharma,A Zamani,A Akhtar (2012). Data Mining for Security Purpose & its Solitude Suggestions.
  4. K Venugopal,K G Srinivasa,L M Patnaik (2009). Soft Computing for Data Mining Applications.
  5. G Vasanthakumar,Bagul Prajakta,P Deepa Shenoy,K Venugopal,L M Patnaik (2015). PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach.
  6. H Zang,J Bolot (2011). Anonymization of Location Data Does Not Work: A Large-Scale Measurement Study.
  7. R Bayardo,R Agrawal (2005). Data Privacy through Optimal k-Anonymization.
  8. Arik Friedman,Ran Wolff,Assaf Schuster (2008). Providing k-anonymity in data mining.
  9. R Lu,X Liang,X Li,X Lin,X Shen (2012). EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
  10. C Dwork,F Mcsherry,K Nissim,A Smith (2006). Calibrating Noise to Sensitivity in Private Data Analysis.
  11. M Siddiqui,M Wang,J Lee (2009). Detecting Internet Worms Using Data Mining Techniques.
  12. V Wu,J Kumar,J Quinlan,Q Ghosh,H Yang,G Motoda,A Mclachlan,B Ng,S Liu,Philip (2008). Top 10 Algorithms in Data Mining.
  13. M Abadeh,J Habibi,C Lucas (2007). Intrusion detection using a fuzzy genetics-based learning algorithm.
  14. Ketan Desale,Roshani Ade (2015). Genetic algorithm based feature selection approach for effective intrusion detection system.
  15. Wu Bin,Lu Tianliang,Zheng Zheng Kangfeng,Lin Dongmei,Xing (2014). Smartphone Malware Detection Model Based on Artificial Immune System.
  16. Deepa Shenoy,K Srinivasa,K Venugopal,L M Patnaik (2005). Dynamic Association Rule Mining using Genetic Algorithms.
  17. Deepa Shenoy,K Srinivasa,K Venugopal,L M Patnaik (2003). Evolutionary Approach for Mining Association Rules on Dynamic Databases.
  18. Shariq Rizvi,Jayant Haritsa (2002). Maintaining Data Privacy in Association Rule Mining.
  19. S Darwish,M Madbouly,M El-Hakeem (2014). A Database Sanitizing Algorithm for Hiding Sensitive Multi-level Association Rule mining.
  20. Jaideep Vaidya,Chris Clifton (2002). Privacy preserving association rule mining in vertically partitioned data.
  21. Jaideep Vaidya,Chris Clifton (2005). Secure set intersection cardinality with application to association rule mining.
  22. M Diwate,A Sahu (2014). Efficient Data Mining in SAMS through Association Rule.
  23. F Thabtah,P Cowling,Y Peng (2005). MCAR: Multiclass Classification based on Association Rule.
  24. K Hu,Y Lu,L Zhou,C Shi (1999). Integrating Classification and Association Rule Mining: A Concept Lattice Framework.
  25. M Hussein,A El-Sisi,N Ismail (2008). Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database.
  26. J Zhan,S Matwin,L Chang (2005). Privacy-Preserving Collaborative Association Rule Mining.
  27. Fosca Giannotti,Laks Lakshmanan,Anna Monreale,Dino Pedreschi,Hui Wang (2013). Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases.
  28. K Ilgun,R Kemmerer,P Porras (1995). State transition analysis: a rule-based intrusion detection approach.
  29. V Kumar,H Chauhan,D Panwar (2013). K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset.
  30. M Taylor (2012). Data Mining with Semantic Features Represented as Vectors of Semantic Clusters.
  31. Stuart Shapiro (2012). Situating anonymization within a privacy risk model.
  32. A Yao (1982). Protocols for Secure Computations.
  33. Assaf Ben-David,Noam Nisan,Benny Pinkas (2008). FairplayMP.
  34. P Mohan,A Thakurta,E Shi,D Song,D Culler (2012). GUPT: Privacy Preserving Data Analysis made Easy.
  35. Aggelos Kiayias,Shouhuai Xu,Moti Yung (2008). Privacy Preserving Data Mining within Anonymous Credential Systems.
  36. Larry Dunning,Ray Kresman (2013). Privacy Preserving Data Sharing With Anonymous ID Assignment.
  37. M Ouda,S Salem,I Ali,E.-S Saad (2015). Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering.
  38. J Vaidya,C Clifton (2004). Privacy-preserving data mining: why, how, and when.
  39. Benny Pinkas (2002). Cryptographic techniques for privacy-preserving data mining.
  40. M Roughan,Y Zhang (2006). Privacy-Preserving Performance Measurements.
  41. W Du,Z Zhan (2003). Using Randomized Response Techniques for Privacy-Preserving Data Mining.
  42. M Kantarcioglu,C Clifton (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data.
  43. Justin Zhan (2008). Privacy-preserving collaborative data mining.
  44. Davide Frey,Rachid Guerraoui,Anne-Marie Kermarrec,Antoine Rault,Francois Taiani,Jingjing Wang (2015). Hide & Share: Landmark-Based Similarity for Private KNN Computation.
  45. T Zhu,P Xiong,G Li,W Zhou (2015). Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
  46. Bk,Y Samanthula,W Elmehdwi,Jiang (2015). K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data.
  47. N Nethravathi,Prasanth Rao,P Shenoy,K Venugopal,M Indramma (2015). CBTS: Correlation based transformation strategy for privacy preserving data mining.
  48. Noman Mohammed,Dima Alhadidi,Benjamin Fung,Mourad Debbabi (2014). Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
  49. J Vaidya,B Shafiq,W Fan,D Mehmood,D Lorenzi (2014). A Random Decision Tree Framework for Privacy-Preserving Data Mining.
  50. Yj,Lee (2014). Privacy-preserving Data Mining for Personalized Marketing.
  51. Ning Zhang,Ming Li,Wenjing Lou (2011). Distributed Data Mining with Differential Privacy.
  52. Frank Mcsherry,Ilya Mironov (2009). Differentially private recommender systems.
  53. Arik Friedman,Assaf Schuster (2010). Data mining with differential privacy.
  54. M Roughan,Y Zhang (2006). Secure Distributed Data Mining and Its Application to Large Scale Network Measurements.
  55. N Nethravathi,Prasanth Rao,Vaibhav Desai,P Shenoy,K R Venugopal,M Indiramma (2016). SWCTE: Semantic weighted context tagging engine for privacy preserving data mining.
  56. A Narayanan,V Shmatikov (2009). De-Anonymizing Social Networks.
  57. S Chourse,V Richhariya (2008). Survey Paper on Intrusion Detection Using Data Mining Techniques.
  58. S Kumar,E Spafford (1995). A Software Architecture to Support Misuse Intrusion Detection.
  59. Julia Allen,Alan Christie,William Fithen,John Mchugh,Jed Pickel (2000). State of the Practice of Intrusion Detection Technologies.
  60. R Mitchell,R Chen (2014). Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications.
  61. J Jabez,B Muthukumar (2014). Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach.
  62. E P G Reddy,M Iaeng,V Reddy,Rajulu (2011). A Study of Intrusion Detection in Data Mining.
  63. W Lee,S Stolfo,K Mok (1999). A Data Mining Framework for Building Intrusion Detection Models.
  64. Santosh Sahu,Sauravranjan Sarangi,Sanjaya Jena (2014). A detail analysis on intrusion detection datasets.
  65. A C´ardenas,R Berthier,R Bobba,J Huh,J Jetcheva,D Grochocki,W Sanders (2014). A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
  66. Youssif Al-Nashif,Aarthi Kumar,Salim Hariri,Yi Luo,Ferenc Szidarovsky,Guangzhi Qu (2008). Multi-Level Intrusion Detection System (ML-IDS).
  67. D Beaver,S Micali,P Rogaway (1990). The round complexity of secure protocols.
  68. Wei Lu,Issa Traore (2004). Detecting New Forms of Network Intrusion Using Genetic Programming.
  69. T Lunt,A Tamaru,F Gilham,R Jagannathan,P Neumann,C Jalali (1992). IDES: a progress report (Intrusion-Detection Expert System).
  70. Daniel Barbará,Ningning Wu,Sushil Jajodia (2001). Detecting Novel Network Intrusions Using Bayes Estimators.
  71. M Shetty,N Shekokar (2012). Data Mining Techniques for Real Time Intrusion Detection Systems.
  72. W Lee,S Stolfo,K Mok (2000). Adaptive Intrusion Detection: A Data Mining Approach.
  73. E Bloedorn,A Christiansen,W Hill,C Skorupka,L Talbot,J Tivel (2001). Data Mining for Network Intrusion Detection: How to Get Started.
  74. R Gopalakrishna,E Spafford,J Vitek (2001). Efficient Intrusion Detection using Automaton Inlining.
  75. B Mukherjee,L Heberlein,K Levitt (1994). Network intrusion detection.
  76. R Heady,G Luger,A Maccabe,M Servilla (1990). The architecture of a network level intrusion detection system.
  77. Daniel Barbará,Ningning Wu,Sushil Jajodia (2001). Detecting Novel Network Intrusions Using Bayes Estimators.
  78. M Roesch (1999). SNORT: Lightweight Intrusion Detection for Networks.
  79. R Mitchell,R Chen (2013). Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems.
  80. D.-Y Yeung,Y Ding (2003). Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models.
  81. W Lee,S Stolfo,K Mok (1998). Mining Audit Data to Build Intrusion Detection Models.
  82. S Tanachaiwiwat,K Hwang (2003). Differential Packet Filtering Against DDos Flood Attacks.
  83. Chin-Yang Tseng,Poornima Balasubramanyam,Calvin Ko,Rattapon Limprasittiporn,Jeff Rowe,Karl Levitt (2003). A specification-based intrusion detection system for AODV.
  84. Shraddha Agarwal,Maddipatla Priyusha (2015). A Transformation from Relational Databases to Big Data.
  85. P Soni,P Sharma (2014). An Intrusion Detection System Based on KDD-99 Data Using Data Mining Techniques and Feature Selection.
  86. Moshe Dubiner,Zvi Galil,Edith Magen (1994). Faster tree pattern matching.
  87. Chih-Fong Tsai,Yu-Feng Hsu,Chia-Ying Lin,Wei-Yang Lin (2009). Intrusion detection by machine learning: A review.
  88. D Farid,N Harbi,M Rahman (2010). Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection.
  89. Alex Smola,Bernhard Schölkopf (2004). A tutorial on support vector regression.
  90. Thorsten Joachims (1998). Text categorization with Support Vector Machines: Learning with many relevant features.
  91. Xin Xu,Xuening Wang (2005). An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines.
  92. G Vasanthakumar,P Deepa Shenoy,K Venugopal,L M Patnaik (2015). PFU: Profiling Forum Users in Online Social Networks, A Knowledge Driven Data Mining Approach.
  93. A Herzberg,A Gbara (2004). Trustbar: Protecting (even naive) Web Users from Spoofing and Phishing Attacks.
  94. R Mohammad,F Thabtah,L Mccluskey (2014). Intelligent Rule-Based Phishing Websites Classification.
  95. Samuel Marchal,Jerome Francois,Radu State,Thomas Engel (2014). PhishStorm: Detecting Phishing With Streaming Analytics.
  96. N Abdelhamid,A Ayesh,F Thabtah (2014). Phishing Detection Based Associative Classification Data Mining.
  97. Y Zhang,S Egelman,L Cranor,J Hong Phinding Phish: Evaluating Anti-Phishing Tools.
  98. Maher Aburrous,M Hossain,Keshav Dahal,Fadi Thabtah (2010). Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies.
  99. J Chen,C Guo (2006). Online Detection and Prevention of Phishing Attacks.
  100. A Fu,L Wenyin,X Deng (2006). Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (emd).
  101. T Moore,R Clayton (2007). An Empirical Analysis of the Current State of Phishing Attack and Defence.
  102. P Asha S Manek,Chandra Deepa Shenoy,Mohan,K R Venugopal (2016). Detection of Fraudulent and Malicious Websites by Analysing User Reviews for Online Shopping Websites.
  103. C Jackson,D Simon,D Tan,A Barth (2007). An Evaluation of Extended Validation and Picturein-Picture Phishing attacks.
  104. C Cortes,X Gonzalvo,V Kuznetsov,M Mohri,S Yang (2016). AdaNet: Adaptive Structural Learning of Artificial Neural Networks.
  105. D Bui,T Tuan,H Klempe,B Pradhan,I Revhaug (2015). Spatial Prediction Models for Shallow Landslide Hazards: A Comparative Assessment of the Efficacy of Support Vector Machines, Artificial Neural Networks, Kernel Logistic Regression, and Logistic Model Tree.
  106. M Qin,K Hwang (2003). Effectively Generating Frequent Episode Rules for Anomaly-based Intrusion Detection.
  107. K Hwang,P Dave,S Tanachaiwiwat (2003). Netshield: Protocol Anomaly Detection with Datamining against DDOS Attacks.
  108. Xiaoxue Liu,Peidong Zhu,Yan Zhang,Kan Chen (2015). A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure.
  109. M Schultz,E Eskin,F Zadok,S Stolfo (2001). Data Mining Methods for Detection of New Malicious Executables.
  110. B Wu,T Lu,K Zheng,D Zhang,X Lin (2015). Smartphone Malware Detection Model Based on Artificial Immune System.
  111. D Patel,S Bhatt (2014). Implementnig Data Mining for Detection of Malware from Code.
  112. Mariano Graziano,Davide Balzarotti,Alain Zidouemba (2016). ROPMEMU.
  113. K D Mitropoulos,D Stroggylos,Spinellis (2016). How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.
  114. Andreas Follner,Eric Bodden (2015). ROPocop — Dynamic mitigation of code-reuse attacks.
  115. Dr Parmar,Mathur (2015). Exception-Oriented Programming: Retrofitting Code-Reuse Attacks to Construct Kernel Malware.
  116. Shashank Gupta,B Gupta (2015). XSS-SAFE: A Server-Side Approach to Detect and Mitigate Cross-Site Scripting (XSS) Attacks in JavaScript Code.
  117. M Polychronakis (2009). Generic Detection of Code Injection Attacks using Network-Level Emulation.
  118. P Rauzy,S Guilley (2014). A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA.
  119. S Bhatkar,D Duvarney,R Sekar (2003). Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
  120. Elena Barrantes,David Ackley,Stephanie Forrest,Trek Palmer,Darko Stefanovic,Dino Zovi (2003). Randomized instruction set emulation to disrupt binary code injection attacks.
  121. S Bhatkar,D Duvarney,R Sekar (2005). Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
  122. K Venugopal,Rajkumar Buyya (2013). Mastering C++.
  123. Javid Habibi,Ajay Panicker,Aditi Gupta,Elisa Bertino (2015). DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices.
  124. Mehmet Kayaalp,Timothy Schmitt,Junaid Nomani,Dmitry Ponomarev,Nael Ghazaleh (2015). Signature-Based Protection from Code Reuse Attacks.
  125. Enes Goktas,Elias Athanasopoulos,Herbert Bos,Georgios Portokalidis (2014). Evaluating control-flow restricting defenses.
  126. S Kevin,Z,F Monrose,D Fabian,D Lucas,L Alexandra,S Christopher,R Ahmad (2013). Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space L]ayout Randomization.
  127. V Van Der Veen,E G¨oktas,M Contag,A Pawlowski,X Chen,S Rawat,H Bos,T Holz,E Athanasopoulos,C Giuffrida (2016). A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
  128. Emily Jacobson,Andrew Bernat,William Williams,Barton Miller (2014). Detecting Code Reuse Attacks with a Model of Conformant Program Execution.
  129. Madanlal Musuvathi,David Park,Andy Chou,Dawson Engler,David Dill (2002). CMC.
  130. N Mohanappriya,R (2016). Prediction and Pan Code Reuse Attack by Code Randomization Mechanism and Data Corruption.
  131. Dannie Stanley,Dongyan Xu,Eugene Spafford (2013). Improved kernel security through memory layout randomization.
  132. Y Zhuang,T Zheng,Z Lin (2014). Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization.
  133. Giampaolo Roglia,Lorenzo Martignoni,Roberto Paleari,Danilo Bruschi (2009). Surgically Returning to Randomized lib(c).
  134. Erik Buchanan,Ryan Roemer,Hovav Shacham,Stefan Savage (2008). When good instructions go bad.
  135. A Gupta,S Kerr,M Kirkpatrick,E Bertino (2013). MARLIN: A Fine Grained Randomization Approach to Defend Against ROP Attacks.
  136. Stephen Checkoway,Lucas Davi,Alexandra Dmitrienko,Ahmad-Reza Sadeghi,Hovav Shacham,Marcel Winandy (2010). Return-oriented programming without returns.
  137. L Davi,A.-R Sadeghi,M Winandy (2011). ROP Defender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
  138. L Davi,A Dmitrienko,A.-R Sadeghi,M Winandy Return-Oriented Programming Without Returns on ARM.
  139. Ryan Roemer,Erik Buchanan,Hovav Shacham,Stefan Savage (2012). Return-Oriented Programming.
  140. Kaan Onarlioglu,Leyla Bilge,Andrea Lanzi,Davide Balzarotti,Engin Kirda (2010). G-Free.
  141. V Pappas,M Polychronakis,A Keromytis (2012). Smashing the Gadgets: Hindering Return-Oriented programming using In-Place Code Randomization.
  142. E Buchanan,R Roemer,H Shacham,S Savage (2008). When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC.
  143. Lucas Davi,Ahmad-Reza Sadeghi,Marcel Winandy (2009). Dynamic integrity measurement and attestation.
  144. Ping Chen,Hai Xiao,Xiaobin Shen,Xinchun Yin,Bing Mao,Li Xie (2009). DROP: Detecting Return-Oriented Programming Malicious Code.
  145. Fan Yao,Jie Chen,Guru Venkataramani (2013). JOP-alarm: Detecting jump-oriented programming-based anomalies in applications.
  146. Tyler Bletsch,Xuxian Jiang,Vince Freeh,Zhenkai Liang (2011). Jump-oriented programming.
  147. S Abadeh,A Fernandez,A Bawakid,S Alshomrani,F Herrera (2015). On The Combination of Genetic Fuzzy Systems and Pairwise Learning for Improving Detection Rates on Intrusion Detection Systems.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Niranjan A. 2017. \u201cSecurity in Data Mining- A Comprehensive Survey\u201d. Global Journal of Computer Science and Technology - C: Software & Data Engineering GJCST-C Volume 16 (GJCST Volume 16 Issue C5): .

Download Citation

Issue Cover
GJCST Volume 16 Issue C5
Pg. 51- 72
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
H.2.8
Version of record

v1.2

Issue date

January 27, 2017

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 7165
Total Downloads: 1839
2026 Trends
Research Identity (RIN)
Related Research

Article in Review

Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, introduce a number of privacy threats on the other hand. In this paper, we study some of these issues along with a detailed discussion on the applications of various data mining techniques for providing security. An efficient classification technique when used properly, would allow an user to differentiate between a phishing website and a normal website, to classify the users as normal users and criminals based on their activities on Social networks (Crime Profiling) and to prevent users from executing malicious codes by labelling them as malicious. The most important applications of Data mining is the detection of intrusions, where different Data mining techniques can be applied to effectively detect an intrusion and report in real time so that necessary actions are taken to thwart the attempts of the intruder.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security in Data Mining- A Comprehensive Survey

Niranjan A
Niranjan A UVCE
Nitish A
Nitish A
P Deepa Shenoy
P Deepa Shenoy
Venugopal K R
Venugopal K R

Research Journals