2017
DOI: 10.1515/bsrj-2017-0005
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

Abstract: Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The revi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…In [11], [12], [13], [14], [15], the authors address various aspects of the problems of applying IDA techniques for information security (IS) of UDEE.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11], [12], [13], [14], [15], the authors address various aspects of the problems of applying IDA techniques for information security (IS) of UDEE.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is shown in [12], [13] that the use of IDA techniques can be very effective in addressing the problems related to intrusion detection and privacy protection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, translating the data analysis into a streaming on-line process is always considered a good approach. Stream mining exposes another benefit of the methodology -real-time responsiveness of the system, which has been identified as desirable by many different authors regarding reporting (Belfo et al, 2015), intrusion detection (Al Quhtani, 2017) and others.…”
Section: Introductionmentioning
confidence: 99%