2013
DOI: 10.5120/13920-1804
|View full text |Cite
|
Sign up to set email alerts
|

Application of Data Mining Techniques for Information Security in a Cloud: A Survey

Abstract: India is progressively moving ahead in the field of Information technology. The concept of e-commerce is already in place whereas e-governance is also on the same track. Similarly other sectors like health, judiciaries etc. are following the path. With the advent of information technology, malevolent people now have another option to cause damage to people by doing cyber attacks rather than physical damage, wherein the impact of cyber damage is equally devastating. As people are launching themselves into the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Even though this architecture increases data security, it involves a considerable amount of overhead if the user decides to access the whole data set frequently. To overcome this drawback, data mining tools are used to determine the most frequently used data chunks, which would then be stored in a temporary cache memory [2,9].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though this architecture increases data security, it involves a considerable amount of overhead if the user decides to access the whole data set frequently. To overcome this drawback, data mining tools are used to determine the most frequently used data chunks, which would then be stored in a temporary cache memory [2,9].…”
Section: Discussionmentioning
confidence: 99%
“…Aggarwal and Chaturvedi [9] reviewed how data mining techniques and relevant algorithms could play a significant role in ensuring data security in the cloud. The authors stated that, with the increase in humans' dependence on machines, developing a better and more effective framework for providing a secure electronic infrastructure is required.…”
Section: Introductionmentioning
confidence: 99%
“…The process of reviewing data collected from networks and information systems in order to determine whether or not a security breach or security violation has occurred is referred to as intrusion detection. Testing a network or information system by penetrating it is a method of assessment in which evaluators search for vulnerabilities in the target system [24]. Today, people and families, along with organizations, governments, educational institutions, and our enterprises, see cybersecurity as a crucial component.…”
Section: Cybersecuritymentioning
confidence: 99%
“…The information is shown by the end user in a format that makes it simple to share it with others, such as graphs or tables. Figure 5 illustrates the many different data mining strategies, including [24]: • Clustering is the challenge of recognizing groups and structures in data that are "similar" in some fashion without utilizing known structures in the data. This may be accomplished using a process known as "clustering."…”
Section: Data Miningmentioning
confidence: 99%
“…Despite the surge of research interests and industry applications in the intersection of ML and security, few surveys or overviews were published after 2008, the watershed year of increasing interest in this particular domain. In 2013 [40]surveyed server-side web application security, [41] surveyed data mining applied to security in the cloud focusing on intrusion detection, [42] discussed an ML perspective in network anomaly detection. While they are helpful and informative, the former two are limited by their scope and perspective, and the latter serves as a textbook, hence absent the quintessential of survey -mapping the progresses and charting the state-of-art.…”
Section: Related Workmentioning
confidence: 99%