2022
DOI: 10.1155/2022/3829160
|View full text |Cite|
|
Sign up to set email alerts
|

Application of Data Mining Technology in Software Intrusion Detection and Information Processing

Abstract: In order to improve the efficiency of the software intrusion detection system, the author proposes an application based on data mining technology in software intrusion detection and information processing. Apply data mining technology to software intrusion detection; first, analyze and research software intrusion detection technology and data mining technology, including the basic concepts of software intrusion detection, the realization technology of software intrusion detection, the classification of softwar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Utilizing machine learning, exploitation information theory, mathematical models are built that can be used for inference. [2] Machine learning techniques are suitable in situations where there is no prior knowledge about data patterns, that's why sometimes these methods are also called bottom-up. The important advantage of this method is that there is usually no need for expert people to determine the desired requirements in order to detect intrusion, for this reason they act very quickly and are affordable.…”
Section: Introductionmentioning
confidence: 99%
“…Utilizing machine learning, exploitation information theory, mathematical models are built that can be used for inference. [2] Machine learning techniques are suitable in situations where there is no prior knowledge about data patterns, that's why sometimes these methods are also called bottom-up. The important advantage of this method is that there is usually no need for expert people to determine the desired requirements in order to detect intrusion, for this reason they act very quickly and are affordable.…”
Section: Introductionmentioning
confidence: 99%
“…1. The mechanism of data mining technology in intrusion detection [7] The following are some uses of data mining that may be used for the identification of intrusions: -The purpose of intrusion detection is to find holes or lapses in the security of information systems. A passive approach to security, intrusion detection involves the monitoring of information systems and the generation of alerts in the event that a security breach is discovered.…”
Section: Introductionmentioning
confidence: 99%
“…This article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. This investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
mentioning
confidence: 99%