Importance of Data Mining in Internet Security
ABSTRACT
This research paper highlight the importance and need of data mining in the age of electronic media where large amount of information and consolidated database is readily available. This seemingly useless information can unearth some mind-blowing statistics and predict the future trends with relative ease through use of data mining techniques which can benefit the businesses, start-ups, country and individual alike. However, since data mining is effective in bringing out patterns, correlation and association through complex algorithms and analysis, it has, over the past few decades proved to be a useful tool in cyber or internet security.
…show more content…
Earlier this year, Million of Ebay user’s confidentially was compromised when hackers stole over 233 million user’s Name, Postal Address, DOB, Emails and phone number which put them at the risk of identity threat. While these attacks are serious, the Ebay one is just the beginning, with every milestone the IT is achievable, the cyber terrorists are one step ahead. Companies like Google China, Sony, Heart Bleed, Epsilon and even South Korean Banks and broadcasters are a victim of cyber crimes and hacking. This makes us imperative to install a robust firewall system which can withstand the attacks and protect the business, Economy and people. It can be done through Data mining.
Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to gain competitive advantage, improve processes, gain efficiency, save costs, utilizing and allocating resources optimally. Data mining tools not only analyze data from all perspectives, but also form relationships between seemingly random data into meaningful and actual information by finding correlations or patterns among dozens of fields in large relational databases which can be used to improve business and also gain intelligence which safeguard against
Data mining uses computer-based technology to evaluate data in a database and identify different trends. Effective data mining helps researchers predict economic trends and pinpoint sales prospects. Data mining is stored in data warehouses, which are sophisticated customer databases that allow managers to combine data from several different organization functions.
What is data mining? Data mining is the deriving new information from massive amounts of data in databases (Sauter, 2014, p. 148). Chowdhurry argues that data mining is part of KDD. KDD is knowledge discovery in databases, it is a process that includes data mining. In addition to data mining, KDD includes data preparation, modeling and evaluation of KDD. KDD is at the heart of this research field. This research field is multidisciplinary and includes data visualization, machine learning, database technology, expert systems and statistics. Overall, the use of a case based reasoning and data mining tools within an information system would create a CBR system to solve new problems with adapted solutions and could be used in many industries such as education and healthcare (Chowdhurry,
It was felt that identifying association patterns in DARPA intrusion data set will help to design better Intrusion Detection System (IDS). Since the dataset includes a variety of data ranging from binary, discrete and continuous, these different association rule mining have been proposed in this paper.
DATA MINING: means searching and analyzing large masses of data to discover patterns and develop new information.
With the increased and widespread use of technologies, interest in data mining has increased rapidly. Companies are now utilized data mining techniques to exam their database looking for trends, relationships, and outcomes to enhance their overall operations and discover new patterns that may allow them to better serve their customers. Data mining provides numerous benefits to businesses, government, society as well as individual persons. However, like many technologies, there are negative things that caused by data mining such as invasion of privacy right. This paper tries to explore the advantages as well as the disadvantages of data mining. In addition, the ethical and global issues regarding the use of data mining
The data required by E-commerce not only attracts businesses and consumers globally, but because of the profitable nature of the data used to exchange money, Internet criminals known as "hackers" electronically probe and loiter networked pathways with the intention of intercepting this valuable information.
Cyber security is in the forefront of every organizations’ core strategy to protect its data and information systems. This increased awareness about cyber security has been driven partly due to the increasing number of cyber-attacks and also due to the various government regulations such as HIPAA, SOX, PCI and so forth. Unlike in the past, attacks on organizations are more targeted, organized and sophisticated and the target of these attacks on organizations are to obtain proprietary and sensitive information. The exponential growth in the number of cyber-attacks can no longer be contained using static, existing standard security
Data mining is a relatively new phenomenon, therefore the number of peer-reviewed journal articles, blogs and other online sources on the topic are limited but growing rapidly. One key book, Data Mining and Analysis: Fundamental Concepts and Algorithms by Zaki and Meira Jr., takes an algorithmic approach, as the title suggests. Zaki and Meira Jr. define data mining by stating that “data mining comprises the core algorithms that enable one to gain fundamental insights and knowledge
As the internet grows vastly the more dangerous it becomes to its users. With the new advances in technology cyberspace fraud has been increasing. These new advances have made the internet vulnerable to various kinds of e-commerce fraud. New techniques to detect and prevent cyber fraud have been developed to discover and prevent criminals before the fact, rather than after the damage have been done. Individuals and businesses should recognize each new cyber attack and make themselves aware of the consequences each attack can create. This paper will discuss the new cyber attacks that are increasing and how individuals and businesses are affected.
Although the internet has given society, multitudinous betterments of our standards of living, the people privately relinquish all our personal information to, also are unprosperous in safeguarding our information. Veritably, as we become, especially Americans, fitting to wanting the utmost convenient technology, without help open numerous opportunities for hackers. Furthermore, if a hacker found a household made this year it would have a security system that’s connected to your phone, oven, TV, internet provider, computers, watch, etc. Moreover, if our own selves are to protect people’s information today, at this point organizations who are making electronics need a larger security team or the innovation encompassing internet security needs to advance.
The development of technology has brought Internet to become the mass communication media between people or companies. Through Internet, people can communicate with other people in various places. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security.
Internet has grown leap and bounds over the last few years. This has resulted in a number of computer security breaches on the Internet. Most of the computers that use Internet are vulnerable to attack. Due to this reason, Intrusion Detection systems have grown rapidly and there is an ongoing research since it’s a developing field. ID (Intrusion Detection) is a type of a security management system that gathers and analyzes information to identify security breaches, which include both, attacks from outside the organization and attacks from inside as well (misuse). ID includes analysis of abnormal activity, tracking user policy violations, assessing systems and file integrity and vulnerability. It helps us differentiate the normal behavior of system and helps us obtain any abnormal activity that is taking place. This can be done easily using data mining and it helps increase its sustainability to attacks.
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. One of the most challenging problems facing crime analysts is that of identifying “crime series” which are sets of crimes committed by the same individual or group. Detecting series’ of crime can be an important step in predictive policing, as knowledge of an ongoing pattern can be of paramount importance towards stopping it. This easy to implement data mining framework works with the geo spatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for RAW.
Looking toward the future with the exponential evolution in technology, it is key to gather a more in depth and analytical study of the methodologies involved in firewall systems.Observing the current direction of firewall development can provide an idea of the improvements that can be made to keep up with an ever expanding technological society; especially as more and more people are being exposed, uneducated, to the dangers of the internet.
Data mining is the analyzing of large data sets to gather new information. It combines the fields of statistics with computer science to make decisions and info usually used by business. New products to sell and improvements to current ones usually are results from this field. Companies usually have these data sets together on large servers. As you can imagine, this makes it tempting for hackers to get access to. Depending on the type of data, users privacy